[dos] Kentico CMS 11.0 - Buffer Overflow
Kentico CMS 11.0 - Buffer Overflow
https://www.exploit-db.com/exploits/43547/?rss
Kentico CMS 11.0 - Buffer Overflow
https://www.exploit-db.com/exploits/43547/?rss
[shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110 bytes)
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110 bytes)
https://www.exploit-db.com/exploits/43551/?rss
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (110 bytes)
https://www.exploit-db.com/exploits/43551/?rss
[shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43550/?rss
Linux/x86-64 - Execute /bin/sh Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43550/?rss
[shellcode] Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
https://www.exploit-db.com/exploits/43549/?rss
Linux/x86-64 - Execute /bin/sh Shellcode (27 bytes)
https://www.exploit-db.com/exploits/43549/?rss
[dos] PyroBatchFTP < 3.19 - Buffer Overflow
PyroBatchFTP < 3.19 - Buffer Overflow
https://www.exploit-db.com/exploits/43548/?rss
PyroBatchFTP < 3.19 - Buffer Overflow
https://www.exploit-db.com/exploits/43548/?rss
[shellcode] Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)
Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43553/?rss
Linux/x86-64 - execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43553/?rss
[shellcode] Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96 bytes)
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96 bytes)
https://www.exploit-db.com/exploits/43552/?rss
Linux/x86-64 - Add Map (127.1.1.1 google.lk) In /etc/hosts Shellcode (96 bytes)
https://www.exploit-db.com/exploits/43552/?rss
[papers] Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
http://www.exploit-db.com/docs/english/43529-windows-kernel-exploitation-tutorial-part-5-null-pointer-dereference.pdf?rss
Windows Kernel Exploitation Tutorial Part 5: NULL Pointer Dereference
http://www.exploit-db.com/docs/english/43529-windows-kernel-exploitation-tutorial-part-5-null-pointer-dereference.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
http://www.exploit-db.com/docs/english/43528-windows-kernel-exploitation-tutorial-part-4-pool-feng-shui-–>-pool-overflow.pdf?rss
Windows Kernel Exploitation Tutorial Part 4: Pool Feng-Shui –> Pool Overflow
http://www.exploit-db.com/docs/english/43528-windows-kernel-exploitation-tutorial-part-4-pool-feng-shui-–>-pool-overflow.pdf?rss
[papers] Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
http://www.exploit-db.com/docs/english/43527-windows-kernel-exploitation-tutorial-part-3-arbitrary-memory-overwrite-(write-what-where).pdf?rss
Windows Kernel Exploitation Tutorial Part 3: Arbitrary Memory Overwrite (Write-What-Where)
http://www.exploit-db.com/docs/english/43527-windows-kernel-exploitation-tutorial-part-3-arbitrary-memory-overwrite-(write-what-where).pdf?rss
[shellcode] Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)
Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)
https://www.exploit-db.com/exploits/43558/?rss
Linux/x86-64 - Reverse TCP Password (hell) /bin/sh Shell (127.0.0.1:4444/TCP) Shellcode (136 bytes)
https://www.exploit-db.com/exploits/43558/?rss
[shellcode] Linux/x86-64 - Read /etc/passwd + Write To /tmp/outfile Shellcode (105 bytes)
Linux/x86-64 - Read /etc/passwd + Write To /tmp/outfile Shellcode (105 bytes)
https://www.exploit-db.com/exploits/43557/?rss
Linux/x86-64 - Read /etc/passwd + Write To /tmp/outfile Shellcode (105 bytes)
https://www.exploit-db.com/exploits/43557/?rss
[shellcode] Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
https://www.exploit-db.com/exploits/43556/?rss
Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
https://www.exploit-db.com/exploits/43556/?rss
[shellcode] Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
https://www.exploit-db.com/exploits/43555/?rss
Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
https://www.exploit-db.com/exploits/43555/?rss
[shellcode] Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
https://www.exploit-db.com/exploits/43554/?rss
Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
https://www.exploit-db.com/exploits/43554/?rss
[shellcode] Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
https://www.exploit-db.com/exploits/43559/?rss
Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
https://www.exploit-db.com/exploits/43559/?rss
[webapps] pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
https://www.exploit-db.com/exploits/43560/?rss
pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
https://www.exploit-db.com/exploits/43560/?rss
[shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
https://www.exploit-db.com/exploits/43563/?rss
Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
https://www.exploit-db.com/exploits/43563/?rss
[shellcode] Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
https://www.exploit-db.com/exploits/43562/?rss
Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
https://www.exploit-db.com/exploits/43562/?rss
[shellcode] Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43561/?rss
Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43561/?rss