[] NeoSense
search results for » port: 20.0
Gonçalo Ribeiro Linux/x86_64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (pass) Shellcode (120 bytes)
linux_x86-64 120.0
Ken Kitahara Linux/ARM64 - Read /etc/passwd Shellcode (120 Bytes)
arm 120.0
Rajvardhan Linux/x86 - execve(/bin/sh) Shellcode (20 bytes)
linux_x86 20.0
Ken Kitahara Linux/ARM - execve(_/bin/sh__ NULL_ NULL) + read(0_ buf_ 0xff) Stager Shellcode (20 Bytes)
arm 20.0
Nathu Nandwani Linux/x86 - Kill Process Shellcode (20 bytes)
linux_x86 20.0
Google Security Research Blizzard Update Agent - JSON RPC DNS Rebinding
local windows 1120.0
Metasploit ManageEngine Desktop Central 9 - FileUploadServlet ConnectionId (Metasploit)
remote jsp 8020.0 CVE-2015-8249;OSVDB-130862
Paw Petersen Linux/x86 - Egghunter (0x5159) Shellcode (20 bytes)
linux_x86 20.0
Mohamed Idris ManageEngine Desktop Central 9 Build 90087 - Cross-Site Request Forgery
webapps multiple 8020.0 CVE-2014-9331;OSVDB-117896
Metasploit ManageEngine Desktop Central StatusUpdate - Arbitrary File Upload (Metasploit)
remote windows 8020.0 CVE-2014-5005;OSVDB-110643;CVE-2014-5006
Pedro Ribeiro ManageEngine Password Manager - MetadataServlet.dat SQL Injection (Metasploit)
webapps multiple 8020.0 CVE-2014-3996;OSVDB-110198
Metasploit DesktopCentral AgentLogUpload - Arbitrary File Upload (Metasploit)
remote windows 8020.0 OSVDB-100008;CVE-2014-5007;CVE-2013-7390
funkysh Linux/StrongARM - setuid() Shellcode (20 bytes)
arm 20.0
izik Linux/x86 - reboot() Shellcode (20 bytes)
linux_x86 20.0
lamagra Linux/x86 - Reverse (/TCP) Shell (/bin/sh) Shellcode (120 bytes)
linux_x86 120.0