Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)
Linux/x86-64 - Bind TCP (1337/TCP) Netcat (/bin/nc) Shell (/bin/sh) Shellcode (131 bytes)
https://www.exploit-db.com/exploits/43601/?rss
[webapps] Flash Operator Panel 2.31.03 - Command Execution
Flash Operator Panel 2.31.03 - Command Execution
https://www.exploit-db.com/exploits/43600/?rss
[webapps] Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
Oracle E-Business Suite 12.1.3/12.2.x - Open Redirect
https://www.exploit-db.com/exploits/43592/?rss
[shellcode] OpenBSD/x86 - reboot() Shellcode (15 bytes)
OpenBSD/x86 - reboot() Shellcode (15 bytes)
https://www.exploit-db.com/exploits/43608/?rss
[remote] Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
https://www.exploit-db.com/exploits/43609/?rss
[shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
https://www.exploit-db.com/exploits/43611/?rss
[shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
OSX/PPC - Remote findsock by recv() Key Shellcode
https://www.exploit-db.com/exploits/43610/?rss
[shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43617/?rss
[shellcode] OSX/PPC - execve(/bin/sh) Shellcode
OSX/PPC - execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43616/?rss
[shellcode] OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
https://www.exploit-db.com/exploits/43615/?rss
[shellcode] OSX/PPC - Stager Sock Reverse Shellcode
OSX/PPC - Stager Sock Reverse Shellcode
https://www.exploit-db.com/exploits/43614/?rss
[shellcode] OSX/PPC - Stager Sock Find Shellcode
OSX/PPC - Stager Sock Find Shellcode
https://www.exploit-db.com/exploits/43613/?rss
[shellcode] OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
https://www.exploit-db.com/exploits/43612/?rss
[shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43618/?rss
[shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
https://www.exploit-db.com/exploits/43620/?rss
[shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
https://www.exploit-db.com/exploits/43619/?rss
[shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43622/?rss
[shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43621/?rss
[shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43625/?rss
[shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
https://www.exploit-db.com/exploits/43624/?rss
[shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
Solaris/SPARC - Bind TCP Shell Shellcode
https://www.exploit-db.com/exploits/43623/?rss