Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
https://www.exploit-db.com/exploits/43538/?rss
[shellcode] Linux/StrongARM - setuid() Shellcode (20 bytes)
Linux/StrongARM - setuid() Shellcode (20 bytes)
https://www.exploit-db.com/exploits/43537/?rss
[shellcode] Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 bytes)
Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 bytes)
https://www.exploit-db.com/exploits/43536/?rss
[webapps] Xnami 1.0 - Cross-Site Scripting
Xnami 1.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43535/?rss
[shellcode] Linux/MIPS (Little Endian) - execve(/bin/sh) Shellcode (56 bytes)
Linux/MIPS (Little Endian) - execve(/bin/sh) Shellcode (56 bytes)
https://www.exploit-db.com/exploits/43544/?rss
[shellcode] Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 bytes)
Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 bytes)
https://www.exploit-db.com/exploits/43542/?rss
[shellcode] Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
https://www.exploit-db.com/exploits/43541/?rss
[shellcode] Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43546/?rss
[shellcode] Linux/SPARC - setreuid(0,0) + execve(/bin/sh) Shellcode (64 bytes)
Linux/SPARC - setreuid(0,0) + execve(/bin/sh) Shellcode (64 bytes)
https://www.exploit-db.com/exploits/43545/?rss
[webapps] Taxi Booking Script 1.0 - Cross-site Scripting
Taxi Booking Script 1.0 - Cross-site Scripting
https://www.exploit-db.com/exploits/43543/?rss
[dos] Kentico CMS 11.0 - Buffer Overflow
Kentico CMS 11.0 - Buffer Overflow
https://www.exploit-db.com/exploits/43547/?rss
[shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110 bytes)
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110 bytes)
https://www.exploit-db.com/exploits/43551/?rss
[shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43550/?rss
[shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
https://www.exploit-db.com/exploits/43549/?rss
[dos] PyroBatchFTP < 3.19 - Buffer Overflow
PyroBatchFTP < 3.19 - Buffer Overflow
https://www.exploit-db.com/exploits/43548/?rss
[shellcode] Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)
Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43553/?rss
[shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96 bytes)
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96 bytes)
https://www.exploit-db.com/exploits/43552/?rss
[papers] Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
http://www.exploit-db.com/docs/english/43529-windows-kernel-exploitation-tutorial-part-5-null-pointer-dereference.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
http://www.exploit-db.com/docs/english/43528-windows-kernel-exploitation-tutorial-part-4-pool-feng-shui-–&gt-pool-overflow.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
http://www.exploit-db.com/docs/english/43527-windows-kernel-exploitation-tutorial-part-3-arbitrary-memory-overwrite-(write-what-where).pdf?rss
[shellcode] Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)
Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)
https://www.exploit-db.com/exploits/43558/?rss