[] NeoSense
search results for » port: 72.0
boku Linux/x64 - Bind (0.0.0.0:4444/TCP) Shell (/bin/bash) + Password (P3WP3Wl4ZerZ) + Null-free Shellcode (272 Bytes)
linux_x86-64 272.0
strider Linux/x86 - Shred File (test.txt) Shellcode (72 bytes)
linux_x86 72.0
Metasploit Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)
remote multiple 25672.0
Metasploit Erlang - Port Mapper Daemon Cookie Remote Code Execution (Metasploit)
remote multiple 25672.0
Robert L. Taylor Linux/x64 - Reverse Netcat Shell (127.0.0.1:1337) Shellcode (72 bytes)
linux_x86-64 72.0
Filippo Bersani Linux/x86 - execve(/bin/bash -c) Arbitrary Command Execution + Null-Free Shellcode (72 bytes)
linux_x86 72.0
Kyzer Linux/x64 - Reverse (10.1.1.4/TCP) Shell + Continuously Probing Via Socket + Port-Range (391-399) + Password (la crips) + Null-Free Shellcode (172 bytes)
linux_x86-64 172.0
S3ba ManageEngine Password Manager Pro 8102 to 8302 - Multiple Vulnerabilities
webapps jsp 7272.0
Marlow Tannhauser Xeams 4.5 Build 5755 - Multiple Vulnerabilities
webapps php 5272.0 CVE-2015-3141;OSVDB-121847
Maximiliano Gomez Vidal Linux/x86 - Reverse (192.168.1.133:33333/TCP) Shell (/bin/sh) Shellcode (72 bytes)
linux_x86 72.0
Geyslan G. Bem Linux/x86 - Reverse (127.1.1.1:55555/TCP) Shell + Null-Free Shellcode (72 bytes)
linux_x86 72.0
midnitesnake Linux/ARM (Raspberry Pi) - Reverse (10.1.1.2:0x1337/TCP) Shell (/bin/sh) Shellcode (72 bytes)
arm 72.0
Metasploit InterSystems Cache - UtilConfigHome.csp Argument Buffer Overflow (Metasploit)
remote windows 57772.0 OSVDB-60549
anonymous IRIX - execve(/bin/sh -c) Shellcode (72 bytes)
irix 72.0
Michel Kaempf Linux/SPARC - setreuid(0_0) + execve() Shellcode (72 bytes)
linux_sparc 72.0
haphet OSX/PPC - execve(/bin/sh_[/bin/sh]_NULL) + exit() Shellcode (72 bytes)
osx_ppc 72.0
page: 1/2 [exploits: 21]