[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 6.0
Sayan Ray
Linux/x86-64 - execve(_/bin/sh_) Shellcode (36 bytes)
linux_x86-64
36.0
Senzee
Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
windows
476.0
Eduardo Silva
FlipRotation v1.0 decoder - Shellcode (146 bytes)
linux
146.0
boku
macOS/x64 - Execve Caesar Cipher String Null-Free Shellcode
macos
286.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm
176.0
Jonathan So
Linux/x86 - execve(/bin/sh) + Reposition + INC Encoder Shellcode (66 bytes)
linux_x86
66.0
Metasploit
Apache Spark - (Unauthenticated) Command Execution (Metasploit)
remote
java
6066.0
Metasploit
Apache Spark - (Unauthenticated) Command Execution (Metasploit)
remote
java
6066.0
Kevin Kirsche
Linux/x86 - Bind (1337/TCP) Shell (/bin/sh) + IPv4/6 Shellcode (146 bytes)
linux_x86
146.0
Kartik Durg
Linux/x86 - Reverse (::FFFF:192.168.1.5:4444/TCP) Shell (/bin/sh) + Null-Free + IPv6 Shellcode (86 bytes)
linux_x86
86.0
Ken Kitahara
Linux/ARM - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (116 Bytes)
arm
116.0
Paolo Perego
Linux/x86 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) Shellcode (96 Bytes)
linux_x86
96.0
rtmcx
Linux/ARM - Reverse (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password (MyPasswd) + Null-Free Shellcode (156 bytes)
arm
156.0
Hashim Jawad
Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
linux_x86
26.0
0x4ndr3
Linux/x64 - Add Map (127.1.1.1 google.lk) To /etc/hosts Shellcode (96 bytes)
linux_x86-64
96.0
Hashim Jawad
Linux/x86 - chmod 777 /etc/sudoers Shellcode (36 bytes)
linux_x86
36.0
«
1
2
3
4
5
6
7
8
»
page: 1/8 [exploits: 121]