[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 31.0
Aron Mihaljevic
Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (131 bytes)
linux_x86-64
131.0
Ken Kitahara
Apple macOS - execve(/bin/sh) + Null-Free Shellcode (31 bytes)
macos
31.0
Touhid M.Shaikh
Linux/x64 - execve(/bin/sh) Shellcode (31 bytes) (1)
linux_x86-64
31.0
WangYihang
Linux/x64 - execve(/bin/sh) Shellcode (31 bytes) (2)
linux_x86-64
31.0
Robert L. Taylor
Linux/x64 - setuid(0) + execve(/bin/sh) + Polymorphic Shellcode (31 bytes)
linux_x86-64
31.0
Filippo Bersani
Linux/x86 - Egghunter (0x56767606) Using fstenv + Obfuscation Shellcode (31 bytes)
linux_x86
31.0
Fugu
Windows - Keylogger To File (./log.bin) + Null-Free Shellcode (431 bytes)
windows
431.0
d4sh&r
Linux/x64 - execve() + Polymorphic Shellcode (31 bytes)
linux_x86-64
31.0
Ajith Kp
Linux/x86 - execve(/bin/bash) Shellcode (31 bytes)
linux_x86
31.0
Josep Pi Rodriguez
Dell Netvault Backup 10.0.1.24 - Denial of Service
dos
windows
20031.0
CVE-2015-5696;OSVDB-125604
Metasploit
CUPS Filter - Bash Environment Variable Code Injection (Metasploit)
remote
linux
631.0
CVE-2014-7910;CVE-2014-7227;CVE-2014-7196;CVE-2014-7169;CVE-2014-62771;OSVDB-112004;CVE-2014-6271;CVE-2014-3671;CVE-2014-3659
hammackj
OSX/x64 - Reverse (FFFFFFFF:4444/TCP) Shell (/bin/sh) Shellcode (131 bytes)
osx
131.0
Jonathan Salwan
Linux/ARM - execve(_/bin/sh__NULL_0) Shellcode (31 bytes)
arm
31.0
gunslinger_
Linux/x86 - Bind (31337/TCP) Shell + setreuid(0_0) + Polymorphic Shellcode (131 bytes)
linux_x86
131.0
Hack'n Roll
FreeBSD/x64 - exec /bin/sh Shellcode (31 bytes)
freebsd_x86-64
31.0
agix
Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes)
windows_x86
31.0
«
1
2
»
page: 1/2 [exploits: 26]