[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port:
Muzaffer Umut ŞAHİN
Linux/x86_64 - execve(_/bin/sh__[_-c__cmd]_NULL) Arbitrary Command Execution Shellcode (63 bytes)
linux_x86-64
63.0
Victor Huerlimann
Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64
564.0
Al Baradi Joy
Linux/x86 - Reverse TCP Shellcode (95 bytes)
linux_x86
95.0
Sayan Ray
Linux/x86-64 - execve(_/bin/sh_) Shellcode (36 bytes)
linux_x86-64
36.0
Senzee
Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
windows
476.0
Ivan Nikolsky
Linux/x64 - memfd_create ELF loader Shellcode (170 bytes)
linux
170.0
Senzee
Windows/x64 - PIC Null-Free Calc.exe Shellcode (169 Bytes)
windows
169.0
Jeenika Anadani
Linux/x86_64 - bash Shellcode with xor encoding
linux_x86-64
71.0
Xavi Beltran
Windows/x86 - Create Administrator User / Dynamic PEB & EDT method null-free Shellcode (373 bytes)
windows_x86
373.0
Eduardo Silva
FlipRotation v1.0 decoder - Shellcode (146 bytes)
linux
146.0
Eduardo Silva
Linux/x86 - Polymorphic linux x86 Shellcode (92 Bytes)
linux_x86
92.0
boku
macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
macos
286.0
boku
macOS/x64 - Execve Null-Free Shellcode
macos
253.0
Tarek Ahmed
Windows/x86 - Locate kernel32 base address / Stack Crack method NullFree Shellcode (171 bytes)
windows_x86
171.0
Tarek Ahmed
Windows/x86 - Locate kernel32 base address / Memory Sieve method Shellcode (133 bytes)
windows_x86
133.0
Techryptic
Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)
windows_x86
458.0
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 1/269 [exploits: 4303]