[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 56.0
rtmcx
Linux/ARM - Reverse (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password (MyPasswd) + Null-Free Shellcode (156 bytes)
arm
156.0
odzhancode
Linux - Bind (/TCP) Shell + Dual/Multi Mode Shellcode (156 bytes)
linux
156.0
Roziul Hasan Khan Shifat
Windows/x86 (7) - localhost Port Scanner Shellcode (556 bytes)
windows_x86
556.0
sajith
Linux/x86 - Bind (13337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (56 bytes)
linux_x86
56.0
Brandon Dennis
Linux/x86 - Bind (4444/TCP) Shell (/bin/bash) Shellcode (656 bytes)
linux_x86
656.0
B3mB4m
Linux x86/x64 - Read /etc/passwd Shellcode (156 bytes)
linux
156.0
Metasploit
Achat 0.150 beta7 - Remote Buffer Overflow (Metasploit)
remote
windows
9256.0
OSVDB-118205
Osanda Malith Jayathissa
Linux/x86 - shutdown -h now Shellcode (56 bytes)
linux_x86
56.0
anonymous
Windows (XP SP2) - PEB ISbeingdebugged Beep Shellcode (56 bytes)
windows
56.0
H D Moore
Windows/x86 (NT/XP/2000/2003) - Bind (8721/TCP) Shell Shellcode (356 bytes)
windows_x86
356.0
anonymous
Alpha - setuid() Shellcode (156 bytes)
alpha
156.0
XenoMuta
Linux/x86 - Promiscuous Mode Detector Shellcode (56 bytes)
linux_x86
56.0
suN8Hclf
FreeBSD/x86 - setreuid() + execve(pfctl -d) Shellcode (56 bytes)
freebsd_x86
56.0
lhall
Solaris/SPARC - setreuid() + execve() Shellcode (56 bytes)
solaris_sparc
56.0
core
Linux/MIPS (Little Endian) - execve(/bin/sh) Shellcode (56 bytes)
linux_mips
56.0
dev0id
BSD/x86 - symlink /bin/sh + XORing Encoded Shellcode (56 bytes)
bsd_x86
56.0