[] NeoSense
search results for » port: 4.0
Victor Huerlimann Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64 564.0
boku Linux/x86 - Bind Shell Generator Shellcode (114 bytes)
linux_x86 114.0
Ken Kitahara Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm 164.0
Aron Mihaljevic Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (104 bytes)
linux_x86-64 104.0
Daniele Votta Linux/x86 - execve(/bin/sh) + NOT Encoder / Decoder Shellcode (44 bytes)
linux_x86 44.0
Gokul Babu Linux/ARM - Bind TCP (0.0.0.0:4321) Shell (/bin/sh) + Null-Free Shellcode (84 bytes)
arm 84.0
Gokul Babu Linux/ARM - Reverse (192.168.1.124:4321/TCP) Shell (/bin/sh) Shellcode (64 bytes)
arm 64.0
Roziul Hasan Khan Shifat Windows/x64 - Remote (Bind TCP) Keylogger Shellcode (864 bytes) (Generator)
windows_x86-64 864.0
Kartik Durg Linux/x86 - execve(/bin/sh) + MMX/ROT13/XOR Shellcode (Encoder/Decoder) (104 bytes)
linux_x86 104.0
Ken Kitahara Linux/ARM - execve(_/bin/sh__ NULL_ NULL) + Jump Back Shellcode (4 Bytes)
arm 4.0
Ray Doyle Linux/x86 - echo _Hello World_ + Random Bytewise XOR + Insertion Encoder Shellcode (54 bytes)
linux_x86 54.0
Kevin Kirsche Linux/x86 - Reverse (fd15:4ba5:5a2b:1002:61b7:23a9:ad3d:5509:1337/TCP) Shell (/bin/sh) + IPv6 Shellcode (Generator) (94 bytes)
linux_x86 94.0
odzhancode Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
arm 104.0
Metasploit Apache CouchDB - Arbitrary Command Execution (Metasploit)
remote linux 5984.0 CVE-2017-12636;CVE-2017-12635
Metasploit Apache CouchDB - Arbitrary Command Execution (Metasploit)
remote linux 5984.0 CVE-2017-12636;CVE-2017-12635
Metasploit Metasploit Framework - 'msfd' Remote Code Execution (Metasploit)
remote ruby 55554.0
page: 1/10 [exploits: 148]