[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 8.0
Techryptic
Windows/x86 - Download File and Execute / Dynamic PEB & EDT method Shellcode (458 bytes)
windows_x86
458.0
Lee Mazzoleni
Linux/x64 - Reverse (192.168.55.42:443/TCP) Shell + Stager + Null-Free Shellcode (188 bytes)
linux_x86-64
188.0
Pedro Cabral
Linux/x86 - execve(/bin/sh) + NOT +SHIFT-N+ XOR-N Encoded Shellcode (168 bytes)
linux_x86-64
168.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ [_/bin/sh_]_ NULL) Shellcode (48 Bytes)
arm
48.0
Ken Kitahara
Linux/ARM64 - execve(_/bin/sh__ NULL_ NULL) + Jump Back Shellcode (8 Bytes)
arm
8.0
Ken Kitahara
Linux/ARM64 - Egghunter (PWN!PWN!) + execve(_/bin/sh__ NULL_ NULL) + mprotect() Shellcode (88 Bytes)
arm
88.0
Ken Kitahara
Linux/ARM64 - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
arm
128.0
Aron Mihaljevic
Linux/x86_64 - Delete File (test.txt) Shellcode (28 bytes)
linux_x86-64
28.0
Dhiraj Mishra
Spring Cloud Config 2.1.x - Path Traversal (Metasploit)
webapps
java
8888.0
CVE-2019-3799
Dhiraj Mishra
Spring Cloud Config 2.1.x - Path Traversal (Metasploit)
webapps
java
8888.0
CVE-2019-3799
Hacker House
Linux/Tru64 alpha - execve(/bin/sh) Shellcode (108 bytes)
linux
108.0
Daniele Votta
Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)
linux_x86
88.0
Kiewicz
Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (3)
linux_x86
58.0
Joao Batista
Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (2)
linux_x86
58.0
T3jv1l
CloudMe Sync 1.11.2 - Buffer Overflow + Egghunt
remote
windows
8888.0
T3jv1l
CloudMe Sync 1.11.2 - Buffer Overflow + Egghunt
remote
windows
8888.0
«
1
2
3
4
5
6
7
8
9
10
»
page: 1/10 [exploits: 153]