[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » port: 9.0
Senzee
Windows/x64 - PIC Null-Free Calc.exe Shellcode (169 Bytes)
windows
169.0
Metasploit
Microsoft Windows - BlueKeep RDP Remote Windows Kernel Use After Free (Metasploit)
remote
windows
3389.0
CVE-2019-0708
Metasploit
Microsoft Windows - BlueKeep RDP Remote Windows Kernel Use After Free (Metasploit)
remote
windows
3389.0
CVE-2019-0708
Gonçalo Ribeiro
Linux/x86_64 - Bind (4444/TCP) Shell (/bin/sh) + Password (pass) Shellcode (129 bytes)
linux_x86-64
129.0
Metasploit
Redis 4.x / 5.x - Unauthenticated Code Execution (Metasploit)
remote
linux
6379.0
RAMELLA Sebastien
Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
dos
windows
3389.0
CVE-2019-0708
RAMELLA Sebastien
Microsoft Windows Remote Desktop - 'BlueKeep' Denial of Service (Metasploit)
dos
windows
3389.0
CVE-2019-0708
LockedByte
Linux/x86 - chmod + execute(/usr/bin/wget http://192.168.1.93//x) + Hide Output Shellcode (129 bytes)
linux_x86
129.0
Xavi Beltran
Linux/x86 - Multiple keys XOR Encoder / Decoder execve(/bin/sh) Shellcode (59 bytes)
generator
59.0
strider
Linux/x86 - Add User (sshd/root) To /etc/passwd Shellcode (149 bytes)
linux_x86
149.0
Ken Kitahara
Apple macOS - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (129 bytes)
macos
129.0
Ken Kitahara
Apple macOS - Reverse (::1:4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (119 bytes)
macos
119.0
Joao Batista
Linux/x86 - execve(/bin/sh) + RShift-1 Encoded Shellcode (29 bytes)
linux_x86
29.0
strider
Linux/x86 - execve(/bin/sh -c) + wget (http://127.0.0.1:8080/evilfile) + chmod 777 + Execute Shellcode (119 bytes)
linux_x86
119.0
Kağan Çapar
Linux/x64 - Reverse (0.0.0.0:1907/TCP) Shell Shellcode (119 Bytes)
linux_x86-64
119.0
Metasploit
Morris Worm - fingerd Stack Buffer Overflow (Metasploit)
remote
bsd
79.0
«
1
2
3
4
5
6
7
8
9
10
11
...
»
page: 1/12 [exploits: 187]