[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 75.0
Metasploit
Docker Daemon - Unprotected TCP Socket (Metasploit)
remote
python
2375.0
wetw0rk
Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (75 bytes)
linux_x86
75.0
sajith
Linux/x86 - Reverse (192.168.227.129:4444/TCP) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86
75.0
Ajith Kp
Linux/x86 - execve(_/bin/cat__ [_/bin/cat__ _/etc/passwd_]_ NULL) Shellcode (75 bytes)
linux_x86
75.0
blake
Linux/x86 - Bind (8080/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (75 bytes)
linux_x86
75.0
Jonathan Salwan
Linux/x86 - Disable Network Card + Polymorphic Shellcode (75 bytes)
linux_x86
75.0
Andriy Brukhovetskyy
Linux/x64 - Bind (4444/TCP) Shell (/bin/sh) + Password (doomedra) Shellcode (175 bytes)
linux_x86-64
175.0
YAG KOHHA
Windows/x86 - Download File + Execute Shellcode (Browsers Edition) (275+ bytes) (Generator)
generator
275.0
lion
Windows (XP/2000/2003) - Reverse (127.0.0.1:53/TCP) Shell Shellcode (275 bytes) (Generator)
generator
275.0
B-r00t
OSX/PPC - Simple write() Shellcode (75 bytes)
osx_ppc
75.0
Matias Sedalo
Linux/x86 - chmod 666 /etc/shadow + Anti-IDS Shellcode (75 bytes)
linux_x86
75.0