Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] Linux/ARM - chmod("/etc/passwd", 0777) Shellcode (39 bytes)
Linux/ARM - chmod("/etc/passwd", 0777) Shellcode (39 bytes)
https://www.exploit-db.com/exploits/43531/?rss
[shellcode] Linux/ARM - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (79 bytes)
Linux/ARM - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (79 bytes)
https://www.exploit-db.com/exploits/43530/?rss
[papers] Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
http://www.exploit-db.com/docs/43529.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
http://www.exploit-db.com/docs/43528.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
http://www.exploit-db.com/docs/43527.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 2: Stack Overflow
Windows Kernel Exploitation Tutorial Part 2: Stack Overflow
http://www.exploit-db.com/docs/43526.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment
http://www.exploit-db.com/docs/43525.pdf?rss
[shellcode] Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
Linux/ARM - execve("/bin/sh",NULL,0) Shellcode (31 bytes)
https://www.exploit-db.com/exploits/43534/?rss
[shellcode] Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
Linux/ARM - execve("/bin/sh", [], [0 vars]) Shellcode (35 bytes)
https://www.exploit-db.com/exploits/43533/?rss
[shellcode] Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
Linux/ARM - creat("/root/pwned", 0777) Shellcode (39 bytes)
https://www.exploit-db.com/exploits/43532/?rss
[shellcode] Linux/SuperH (sh4) - setuid(0) + execve("/bin/sh", NULL, NULL) Shellcode (27 bytes)
Linux/SuperH (sh4) - setuid(0) + execve("/bin/sh", NULL, NULL) Shellcode (27 bytes)
https://www.exploit-db.com/exploits/43540/?rss
[shellcode] Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
Linux/StrongARM - Bind TCP /bin/sh Shell Shellcode (203 bytes)
https://www.exploit-db.com/exploits/43539/?rss
[shellcode] Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
Linux/StrongARM - execve(/bin/sh) Shellcode (47 bytes)
https://www.exploit-db.com/exploits/43538/?rss
[shellcode] Linux/StrongARM - setuid() Shellcode (20 bytes)
Linux/StrongARM - setuid() Shellcode (20 bytes)
https://www.exploit-db.com/exploits/43537/?rss
[shellcode] Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 bytes)
Android/ARM - Reverse TCP /system/bin/sh Shell (10.0.2.2:0x3412/TCP) Shellcode (79 bytes)
https://www.exploit-db.com/exploits/43536/?rss
[webapps] Xnami 1.0 - Cross-Site Scripting
Xnami 1.0 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43535/?rss
[shellcode] Linux/MIPS (Little Endian) - execve(/bin/sh) Shellcode (56 bytes)
Linux/MIPS (Little Endian) - execve(/bin/sh) Shellcode (56 bytes)
https://www.exploit-db.com/exploits/43544/?rss
[shellcode] Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 bytes)
Linux/SuperH (sh4) - Bind TCP /bin/sh Shell (31337/TCP) Shellcode (132 bytes)
https://www.exploit-db.com/exploits/43542/?rss
[shellcode] Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
Linux/SuperH (sh4) - execve("/bin/sh", 0, 0) Shellcode (19 bytes)
https://www.exploit-db.com/exploits/43541/?rss
[shellcode] Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
Linux/SPARC - setreuid(0,0) + standard execve() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43546/?rss