[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 4.0
Victor Huerlimann
Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64
564.0
boku
Linux/x86 - Bind Shell Generator Shellcode (114 bytes)
linux_x86
114.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm
164.0
Aron Mihaljevic
Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (104 bytes)
linux_x86-64
104.0
Daniele Votta
Linux/x86 - execve(/bin/sh) + NOT Encoder / Decoder Shellcode (44 bytes)
linux_x86
44.0
Gokul Babu
Linux/ARM - Bind TCP (0.0.0.0:4321) Shell (/bin/sh) + Null-Free Shellcode (84 bytes)
arm
84.0
Gokul Babu
Linux/ARM - Reverse (192.168.1.124:4321/TCP) Shell (/bin/sh) Shellcode (64 bytes)
arm
64.0
Roziul Hasan Khan Shifat
Windows/x64 - Remote (Bind TCP) Keylogger Shellcode (864 bytes) (Generator)
windows_x86-64
864.0
Kartik Durg
Linux/x86 - execve(/bin/sh) + MMX/ROT13/XOR Shellcode (Encoder/Decoder) (104 bytes)
linux_x86
104.0
Ken Kitahara
Linux/ARM - execve(_/bin/sh__ NULL_ NULL) + Jump Back Shellcode (4 Bytes)
arm
4.0
Ray Doyle
Linux/x86 - echo _Hello World_ + Random Bytewise XOR + Insertion Encoder Shellcode (54 bytes)
linux_x86
54.0
Kevin Kirsche
Linux/x86 - Reverse (fd15:4ba5:5a2b:1002:61b7:23a9:ad3d:5509:1337/TCP) Shell (/bin/sh) + IPv6 Shellcode (Generator) (94 bytes)
linux_x86
94.0
odzhancode
Linux/ARM - Bind (1234/TCP) Shell (/bin/sh) Shellcode (104 bytes)
arm
104.0
Metasploit
Apache CouchDB - Arbitrary Command Execution (Metasploit)
remote
linux
5984.0
CVE-2017-12636;CVE-2017-12635
Metasploit
Apache CouchDB - Arbitrary Command Execution (Metasploit)
remote
linux
5984.0
CVE-2017-12636;CVE-2017-12635
Metasploit
Metasploit Framework - 'msfd' Remote Code Execution (Metasploit)
remote
ruby
55554.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 1/10 [exploits: 148]