[] NeoSense
search results for » port:
Muzaffer Umut ŞAHİN Linux/x86_64 - execve(_/bin/sh__[_-c__cmd]_NULL) Arbitrary Command Execution Shellcode (63 bytes)
linux_x86-64 63.0
Victor Huerlimann Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64 564.0
Al Baradi Joy Linux/x86 - Reverse TCP Shellcode (95 bytes)
linux_x86 95.0
Sayan Ray Linux/x86-64 - execve(_/bin/sh_) Shellcode (36 bytes)
linux_x86-64 36.0
Senzee Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
windows 476.0
Ivan Nikolsky Linux/x64 - memfd_create ELF loader Shellcode (170 bytes)
linux 170.0
Senzee Windows/x64 - PIC Null-Free Calc.exe Shellcode (169 Bytes)
windows 169.0
Jeenika Anadani Linux/x86_64 - bash Shellcode with xor encoding
linux_x86-64 71.0
Xavi Beltran Windows/x86 - Create Administrator User / Dynamic PEB & EDT method null-free Shellcode (373 bytes)
windows_x86 373.0
Eduardo Silva FlipRotation v1.0 decoder - Shellcode (146 bytes)
linux 146.0
Eduardo Silva Linux/x86 - Polymorphic linux x86 Shellcode (92 Bytes)
linux_x86 92.0
boku macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
macos 286.0
boku macOS/x64 - Execve Null-Free Shellcode
macos 253.0
Tarek Ahmed Windows/x86 - Locate kernel32 base address / Stack Crack method NullFree Shellcode (171 bytes)
windows_x86 171.0
Tarek Ahmed Windows/x86 - Locate kernel32 base address / Memory Sieve method Shellcode (133 bytes)
windows_x86 133.0
Techryptic Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)
windows_x86 458.0
page: 1/269 [exploits: 4303]