[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 64.0
Victor Huerlimann
Windows 11 x64 - Reverse TCP Shellcode (564 bytes)
windows_x86-64
564.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
arm
164.0
Gokul Babu
Linux/ARM - Reverse (192.168.1.124:4321/TCP) Shell (/bin/sh) Shellcode (64 bytes)
arm
64.0
Roziul Hasan Khan Shifat
Windows/x64 - Remote (Bind TCP) Keylogger Shellcode (864 bytes) (Generator)
windows_x86-64
864.0
Kyzer
Linux/x64 - Bind (/TCP) Netcat Shell + Null-Free Shellcode (64 bytes)
linux_x86-64
64.0
Roziul Hasan Khan Shifat
Linux/x64 - Reverse (192.168.86.128:1472/TCP) cat /etc/passwd Shellcode (164 bytes)
linux_x86-64
164.0
Keyman
Linux/x64 - /sbin/shutdown -h now Shellcode (64 bytes)
linux_x86-64
64.0
Metasploit
SerComm Device - Remote Code Execution (Metasploit)
remote
hardware
32764.0
OSVDB-101653;CVE-2014-0659
rigan
Linux/MIPS - Add Root User (rOOt/pwn3d) To /etc/passwd Shellcode (164 bytes)
linux_mips
164.0
sekfault
Linux/x86 - Disable modsecurity Shellcode (64 bytes)
linux_x86
64.0
Jonathan Salwan
Linux/i686 - pacman -S <package> (default package: backdoor) Shellcode (64 bytes)
linux_x86
64.0
XenoMuta
Linux/x86 - /bin/sh + Self-Modifying Anti-IDS Shellcode (35/64 bytes)
linux_x86
64.0
Skylined
Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null-Free Shellcode (164 bytes)
windows_x86
164.0
dev0id
Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) + exit() Shellcode (64 bytes)
linux_x86
64.0
anathema
Linux/SPARC - setreuid(0_0) + execve(/bin/sh) Shellcode (64 bytes)
linux_sparc
64.0
scut/teso
IRIX - Bind (/TCP) Shell (/bin/sh) Shellcode (364 bytes)
irix
364.0
«
1
2
»
page: 1/2 [exploits: 19]