[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 51.0
Daniel Ortiz
Linux/x86 - Force Reboot Shellcode (51 bytes)
linux_x86
51.0
Semen Alexandrovich Lyhin
Windows/x86 (XP Pro SP3) - Download File Via TFTP + Execute Shellcode (51-60 bytes) (Generator)
generator
51.0
Metasploit
QNAP Transcode Server - Command Execution (Metasploit)
remote
hardware
9251.0
B3mB4m
Linux x86/x64 - Bind (4444/TCP) Shell Shellcode (251 bytes)
linux
251.0
Sathishshan
Linux/x64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Password (hack) + Null-Free Shellcode (151 bytes)
linux_x86-64
151.0
Osanda Malith Jayathissa
Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
linux_x86
51.0
Geyslan G. Bem
Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
linux_x86
51.0
Jonathan Salwan
Linux/ARM - Add Root User (shell-storm/toor) To /etc/passwd Shellcode (151 bytes)
arm
151.0
Dustin Schultz
OSX/x64 - setuid() + Shell(/bin/sh) Shellcode (51 bytes)
osx
51.0
fl0 fl0w
Linux/x86 - execve() Shellcode (51 bytes)
linux_x86
51.0
XenoMuta
Linux/x86 - Reverse (54321/UDP) tcpdump Live Packet Capture Shellcode (151 bytes)
linux_x86
151.0
Heretic2
ESRI ArcSDE 9.0 < 9.2sp1 - Remote Buffer Overflow
remote
windows
5151.0
CVE-2007-1770
izik
Linux/x86 - getppid() + execve(/proc/pid/exe) Shellcode (51 bytes)
linux_x86
51.0
nob0dy
Linux/x86 - Kill Snort Shellcode (151 bytes)
linux_x86
151.0