[shellcode] Linux/MIPS (Big Endian) - execve(/bin/sh) + Reverse TCP 192.168.2.157/31337 Shellcode (181 bytes)
Linux/MIPS (Big Endian) - execve(/bin/sh) + Reverse TCP 192.168.2.157/31337 Shellcode (181 bytes)
https://www.exploit-db.com/exploits/45541/?rss
Linux/MIPS (Big Endian) - execve(/bin/sh) + Reverse TCP 192.168.2.157/31337 Shellcode (181 bytes)
https://www.exploit-db.com/exploits/45541/?rss
[webapps] Imperva SecureSphere 13 - Remote Command Execution
Imperva SecureSphere 13 - Remote Command Execution
https://www.exploit-db.com/exploits/45542/?rss
Imperva SecureSphere 13 - Remote Command Execution
https://www.exploit-db.com/exploits/45542/?rss
[local] Microsoft Windows - Net-NTLMv2 Reflection DCOM/RPC (Metasploit)
Microsoft Windows - Net-NTLMv2 Reflection DCOM/RPC (Metasploit)
https://www.exploit-db.com/exploits/45562/?rss
Microsoft Windows - Net-NTLMv2 Reflection DCOM/RPC (Metasploit)
https://www.exploit-db.com/exploits/45562/?rss
[remote] Navigate CMS - Unauthenticated Remote Code Execution (Metasploit)
Navigate CMS - Unauthenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45561/?rss
Navigate CMS - Unauthenticated Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45561/?rss
[local] Zahir Enterprise Plus 6 - Stack Buffer Overflow (Metasploit)
Zahir Enterprise Plus 6 - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/45560/?rss
Zahir Enterprise Plus 6 - Stack Buffer Overflow (Metasploit)
https://www.exploit-db.com/exploits/45560/?rss
[remote] Unitrends UEB - HTTP API Remote Code Execution (Metasploit)
Unitrends UEB - HTTP API Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45559/?rss
Unitrends UEB - HTTP API Remote Code Execution (Metasploit)
https://www.exploit-db.com/exploits/45559/?rss
[dos] Android - sdcardfs Changes current->fs Without Proper Locking
Android - sdcardfs Changes current->fs Without Proper Locking
https://www.exploit-db.com/exploits/45558/?rss
Android - sdcardfs Changes current->fs Without Proper Locking
https://www.exploit-db.com/exploits/45558/?rss
[dos] Linux - Kernel Pointer Leak via BPF
Linux - Kernel Pointer Leak via BPF
https://www.exploit-db.com/exploits/45557/?rss
Linux - Kernel Pointer Leak via BPF
https://www.exploit-db.com/exploits/45557/?rss
[papers] WordPress Penetration Testing using WPScan and MetaSploit
WordPress Penetration Testing using WPScan and MetaSploit
https://www.exploit-db.com/docs/english/45556-wordpress-penetration-testing-using-wpscan-and-metasploit.pdf?rss
WordPress Penetration Testing using WPScan and MetaSploit
https://www.exploit-db.com/docs/english/45556-wordpress-penetration-testing-using-wpscan-and-metasploit.pdf?rss
[remote] Cisco Prime Infrastructure - Unauthenticated Remote Code Execution
Cisco Prime Infrastructure - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/45555/?rss
Cisco Prime Infrastructure - Unauthenticated Remote Code Execution
https://www.exploit-db.com/exploits/45555/?rss
[papers] A Red Teamer’s guide to pivoting
A Red Teamer’s guide to pivoting
https://www.exploit-db.com/papers/45554/?rss
A Red Teamer’s guide to pivoting
https://www.exploit-db.com/papers/45554/?rss
Exploit Database
A Red Teamer’s guide to pivoting
[local] Linux Kernel < 4.11.8 - 'mq_notify: double sock_put()' Local Privilege Escalation
Linux Kernel < 4.11.8 - 'mq_notify: double sock_put()' Local Privilege Escalation
https://www.exploit-db.com/exploits/45553/?rss
Linux Kernel < 4.11.8 - 'mq_notify: double sock_put()' Local Privilege Escalation
https://www.exploit-db.com/exploits/45553/?rss
[papers] CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)
https://www.exploit-db.com/docs/english/45552-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-44).pdf?rss
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 4/4)
https://www.exploit-db.com/docs/english/45552-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-44).pdf?rss
[papers] CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 3/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 3/4)
https://www.exploit-db.com/docs/english/45551-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-34).pdf?rss
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 3/4)
https://www.exploit-db.com/docs/english/45551-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-34).pdf?rss
[papers] CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 2/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 2/4)
https://www.exploit-db.com/docs/english/45550-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-24).pdf?rss
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 2/4)
https://www.exploit-db.com/docs/english/45550-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-24).pdf?rss
[papers] CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4)
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4)
https://www.exploit-db.com/docs/english/45549-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-14).pdf?rss
CVE-2017-11176: A step-by-step Linux Kernel exploitation (part 1/4)
https://www.exploit-db.com/docs/english/45549-cve-2017-11176-a-step-by-step-linux-kernel-exploitation-(part-14).pdf?rss
[local] Git Submodule - Arbitrary Code Execution
Git Submodule - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45548/?rss
Git Submodule - Arbitrary Code Execution
https://www.exploit-db.com/exploits/45548/?rss
[dos] net-snmp 5.7.3 - Authenticated Denial of Service (PoC)
net-snmp 5.7.3 - Authenticated Denial of Service (PoC)
https://www.exploit-db.com/exploits/45547/?rss
net-snmp 5.7.3 - Authenticated Denial of Service (PoC)
https://www.exploit-db.com/exploits/45547/?rss
[papers] Hypervisor From Scratch – Part 4: Address Translation Using Extended Page Table (EPT)
Hypervisor From Scratch – Part 4: Address Translation Using Extended Page Table (EPT)
https://www.exploit-db.com/docs/english/45546-hypervisor-from-scratch-–-part-4-address-translation-using-extended-page-table-(ept).pdf?rss
Hypervisor From Scratch – Part 4: Address Translation Using Extended Page Table (EPT)
https://www.exploit-db.com/docs/english/45546-hypervisor-from-scratch-–-part-4-address-translation-using-extended-page-table-(ept).pdf?rss
[papers] Hypervisor From Scratch – Part 3: Setting up Our First Virtual Machine
Hypervisor From Scratch – Part 3: Setting up Our First Virtual Machine
https://www.exploit-db.com/docs/english/45545-hypervisor-from-scratch-–-part-3-setting-up-our-first-virtual-machine.pdf?rss
Hypervisor From Scratch – Part 3: Setting up Our First Virtual Machine
https://www.exploit-db.com/docs/english/45545-hypervisor-from-scratch-–-part-3-setting-up-our-first-virtual-machine.pdf?rss
[dos] net-snmp 5.7.3 - Unauthenticated Denial of Service (PoC)
net-snmp 5.7.3 - Unauthenticated Denial of Service (PoC)
https://www.exploit-db.com/exploits/45544/?rss
net-snmp 5.7.3 - Unauthenticated Denial of Service (PoC)
https://www.exploit-db.com/exploits/45544/?rss