[shellcode] OpenBSD/x86 - reboot() Shellcode (15 bytes)
OpenBSD/x86 - reboot() Shellcode (15 bytes)
https://www.exploit-db.com/exploits/43608/?rss
OpenBSD/x86 - reboot() Shellcode (15 bytes)
https://www.exploit-db.com/exploits/43608/?rss
[remote] Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
https://www.exploit-db.com/exploits/43609/?rss
Synology Photo Station 6.8.2-3461 - SYNOPHOTO_Flickr_MultiUpload Race Condition File Write Remote Code Execution
https://www.exploit-db.com/exploits/43609/?rss
[shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
https://www.exploit-db.com/exploits/43611/?rss
OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
https://www.exploit-db.com/exploits/43611/?rss
[shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
OSX/PPC - Remote findsock by recv() Key Shellcode
https://www.exploit-db.com/exploits/43610/?rss
OSX/PPC - Remote findsock by recv() Key Shellcode
https://www.exploit-db.com/exploits/43610/?rss
[shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43617/?rss
OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43617/?rss
[shellcode] OSX/PPC - execve(/bin/sh) Shellcode
OSX/PPC - execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43616/?rss
OSX/PPC - execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43616/?rss
[shellcode] OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
https://www.exploit-db.com/exploits/43615/?rss
OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
https://www.exploit-db.com/exploits/43615/?rss
[shellcode] OSX/PPC - Stager Sock Reverse Shellcode
OSX/PPC - Stager Sock Reverse Shellcode
https://www.exploit-db.com/exploits/43614/?rss
OSX/PPC - Stager Sock Reverse Shellcode
https://www.exploit-db.com/exploits/43614/?rss
[shellcode] OSX/PPC - Stager Sock Find Shellcode
OSX/PPC - Stager Sock Find Shellcode
https://www.exploit-db.com/exploits/43613/?rss
OSX/PPC - Stager Sock Find Shellcode
https://www.exploit-db.com/exploits/43613/?rss
[shellcode] OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
https://www.exploit-db.com/exploits/43612/?rss
OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
https://www.exploit-db.com/exploits/43612/?rss
[shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43618/?rss
OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43618/?rss
[shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
https://www.exploit-db.com/exploits/43620/?rss
Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
https://www.exploit-db.com/exploits/43620/?rss
[shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
https://www.exploit-db.com/exploits/43619/?rss
Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
https://www.exploit-db.com/exploits/43619/?rss
[shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43622/?rss
Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43622/?rss
[shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43621/?rss
Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43621/?rss
[shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43625/?rss
Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43625/?rss
[shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
https://www.exploit-db.com/exploits/43624/?rss
Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
https://www.exploit-db.com/exploits/43624/?rss
[shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
Solaris/SPARC - Bind TCP Shell Shellcode
https://www.exploit-db.com/exploits/43623/?rss
Solaris/SPARC - Bind TCP Shell Shellcode
https://www.exploit-db.com/exploits/43623/?rss
[shellcode] Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 bytes)
Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 bytes)
https://www.exploit-db.com/exploits/43626/?rss
Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 bytes)
https://www.exploit-db.com/exploits/43626/?rss
[shellcode] BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
https://www.exploit-db.com/exploits/43629/?rss
BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
https://www.exploit-db.com/exploits/43629/?rss
[shellcode] BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 bytes)
BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 bytes)
https://www.exploit-db.com/exploits/43628/?rss
BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 bytes)
https://www.exploit-db.com/exploits/43628/?rss