[] NeoSense
search results for » port: 45.0
Daniele Votta Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)
linux_x86 45.0
Metasploit HP Mercury LoadRunner Agent magentproc.exe - Remote Command Execution (Metasploit)
remote windows 54345.0 CVE-2010-1549
sleepya Microsoft Windows 7/2008 R2 - 'EternalBlue' SMB Remote Code Execution (MS17-010)
remote windows 445.0 CVE-2017-0144
sleepya Microsoft Windows 8/8.1/2012 R2 (x64) - 'EternalBlue' SMB Remote Code Execution (MS17-010)
remote windows_x86-64 445.0 CVE-2017-0144
Sean Dillon Microsoft Windows - SMB Remote Code Execution Scanner (MS17-010) (Metasploit)
dos windows 445.0 CVE-2017-0147;CVE-2017-0146;CVE-2017-0148;CVE-2017-0145;CVE-2017-0144;CVE-2017-0143;MS17-010
Peter Baris Windows/x64 (10) - Egghunter Shellcode (45 bytes)
windows_x86-64 45.0
lu0xheap Linux/x86 - SELinux Permissive Mode Switcher Shellcode (45 bytes)
linux_x86 45.0
hyp3rlinx Symantec Endpoint Protection Manager 12.1 - Multiple Vulnerabilities
webapps php 8445.0 CVE-2016-5304;CVE-2016-3653;CVE-2016-3652
Mohammad Reza Espargham Linux/x86 - exec /bin/dash Shellcode (45 bytes)
linux_x86 45.0
gunslinger_ Linux/x86 - Give All Users Root Access When Executing /bin/sh Shellcode (45 bytes)
linux_x86 45.0
gunslinger_ Linux/x86 - execve(_/bin/sh__ _-c__ _reboot_) Shellcode (45 bytes)
linux_x86 45.0
gunslinger_ Linux/x86 - execve(_/bin/sh__ _0__ _0_) With umask 16 (sys_umask(14)) Shellcode (45 bytes)
linux_x86 45.0
Stack Windows/x86 (XP SP2) - calc.exe Shellcode (45 bytes)
windows_x86 45.0
laurent gaffie Microsoft Windows 7/2008 R2 - Remote Kernel Crash
dos windows 445.0 CVE-2009-3103;OSVDB-57799
zuc Samba < 3.0.20 - Remote Heap Overflow
remote linux 445.0
Debasis Mohanty Microsoft Windows Server 2000/2003 - Code Execution (MS08-067)
remote windows 445.0 OSVDB-49243;CVE-2008-4250;MS08-067
page: 1/3 [exploits: 38]