[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 38.0
Paolo Perego
Linux/x86 - Egghunter (0xdeadbeef) + access() + execve(/bin/sh) Shellcode (38 bytes)
linux_x86
38.0
odzhancode
Linux/x64 - Egghunter (0xDEADC0DE) Shellcode (38 bytes)
linux_x86-64
38.0
Metasploit
HP StorageWorks P4000 Virtual SAN Appliance - Login Buffer Overflow (Metasploit)
remote
windows
13838.0
CVE-2013-2343;OSVDB-94701;CVE-2012-3282;OSVDB-89918
Russell Willis
Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
linux_x86
38.0
Geyslan G. Bem
Linux/x86 - Egghunter (0x50905090) + Null-Free Shellcode (38 bytes)
linux_x86
38.0
Jonathan Salwan
Linux/ARM - setuid(0) + execve(_/bin/sh___/bin/sh__0) Shellcode (38 bytes)
arm
38.0
RubberDuck
Windows - MessageBoxA() Shellcode (238 bytes)
windows
238.0
Andriy Brukhovetskyy
Linux/x64 - Reverse (192.168.1.9:4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (138 bytes)
linux_x86-64
138.0
dymitri
BSD/x86 / Linux/x86 - execve(/bin/sh) Shellcode (38 bytes)
multiple
38.0
Matias Sedalo
Linux/x86 - execve(/bin/sh) Shellcode (38 bytes)
linux_x86
38.0