[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 76.0
Senzee
Windows/x64 - PIC Null-Free TCP Reverse Shell Shellcode (476 Bytes)
windows
476.0
Ken Kitahara
Linux/ARM64 - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
arm
176.0
Mehmet Ince
Xplico - Remote Code Execution (Metasploit)
remote
linux
9876.0
CVE-2017-16666
Kyzer
Linux/x64 - Bind (4442/TCP) Ncat Shell + SSL + Multi-Channel (4444-4447/TCP) + Persistant + fork() + IPv4/6 + Password + Null-Free Shellcode (176 bytes)
linux_x86-64
176.0
blake
Linux/x86 - Reverse (8080/TCP) Netcat Shell Shellcode (76 bytes)
linux_x86
76.0
d0lc3
Windows (XP SP3) (Spanish) - URLDownloadToFileA() + CreateProcessA() + ExitProcess() Shellcode (176+ bytes) (Generator)
generator
176.0
Jonathan Salwan
Linux/x86 - Bind (8000/TCP) Shell + Flush IPTables Rules (/sbin/iptables -F) Shellcode (176 bytes)
linux_x86
176.0
Sh3llc0d3
Linux/x86 - setreuid() + /sbin/iptables -F + exit(0) Shellcode (76 bytes)
linux_x86
76.0
vaicebine
Linux/MIPS (Linksys WRT54G/GL) - Bind (4919/TCP) Shell (/bin/sh) Shellcode (276 bytes)
linux_mips
276.0
xort
Linux/x86 - Self-Modifying Magic Byte /bin/sh Shellcode (76 bytes)
linux_x86
76.0