[shellcode] Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
https://www.exploit-db.com/exploits/43556/?rss
Linux/x86-64 - shutdown -h now Shellcode (64 bytes)
https://www.exploit-db.com/exploits/43556/?rss
[shellcode] Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
https://www.exploit-db.com/exploits/43555/?rss
Linux/x86-64 - shutdown -h now Shellcode (65 bytes)
https://www.exploit-db.com/exploits/43555/?rss
[shellcode] Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
https://www.exploit-db.com/exploits/43554/?rss
Linux/x86-64 - sys_access() Egghunter Shellcode (49 bytes)
https://www.exploit-db.com/exploits/43554/?rss
[shellcode] Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
https://www.exploit-db.com/exploits/43559/?rss
Linux/x86-64 - Bind TCP Password (hell) /bin/sh Shell (4444/TCP) Shellcode (147 bytes)
https://www.exploit-db.com/exploits/43559/?rss
[webapps] pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
https://www.exploit-db.com/exploits/43560/?rss
pfSense < 2.1.4 - 'status_rrd_graph_img.php' Command Injection
https://www.exploit-db.com/exploits/43560/?rss
[shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
https://www.exploit-db.com/exploits/43563/?rss
Linux/x86-64 - Add User (pwned/$pass$) Using open,write,close Shellcode (358 bytes)
https://www.exploit-db.com/exploits/43563/?rss
[shellcode] Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
https://www.exploit-db.com/exploits/43562/?rss
Linux/x86-64 - Bind TCP Stager (4444/TCP) + Egghunter Shellcode (157 bytes)
https://www.exploit-db.com/exploits/43562/?rss
[shellcode] Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43561/?rss
Linux/x86-64 - Add Root User (shell-storm/leet) Polymorphic Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43561/?rss
[shellcode] Linux/x86-64 - Bind TCP Password (Password) /bin/sh Shell (4444/TCP) Shellcode (173 bytes)
Linux/x86-64 - Bind TCP Password (Password) /bin/sh Shell (4444/TCP) Shellcode (173 bytes)
https://www.exploit-db.com/exploits/43566/?rss
Linux/x86-64 - Bind TCP Password (Password) /bin/sh Shell (4444/TCP) Shellcode (173 bytes)
https://www.exploit-db.com/exploits/43566/?rss
[shellcode] Linux/x86-64 - Read /etc/passwd Shellcode (82 bytes)
Linux/x86-64 - Read /etc/passwd Shellcode (82 bytes)
https://www.exploit-db.com/exploits/43565/?rss
Linux/x86-64 - Read /etc/passwd Shellcode (82 bytes)
https://www.exploit-db.com/exploits/43565/?rss
[shellcode] Linux/x86-64 - Add User (pwned/$pass$) Using echo cmd Shellcode (273 bytes)
Linux/x86-64 - Add User (pwned/$pass$) Using echo cmd Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43564/?rss
Linux/x86-64 - Add User (pwned/$pass$) Using echo cmd Shellcode (273 bytes)
https://www.exploit-db.com/exploits/43564/?rss
[shellcode] Linux/x86-64 - Bind TCP Password (doomedra) Shell (/bin/sh) (4444/TCP) Shellcode (175 bytes)
Linux/x86-64 - Bind TCP Password (doomedra) Shell (/bin/sh) (4444/TCP) Shellcode (175 bytes)
https://www.exploit-db.com/exploits/43570/?rss
Linux/x86-64 - Bind TCP Password (doomedra) Shell (/bin/sh) (4444/TCP) Shellcode (175 bytes)
https://www.exploit-db.com/exploits/43570/?rss
[webapps] Domains & Hostings Manager PRO 3.0 - Authentication Bypass
Domains & Hostings Manager PRO 3.0 - Authentication Bypass
https://www.exploit-db.com/exploits/43569/?rss
Domains & Hostings Manager PRO 3.0 - Authentication Bypass
https://www.exploit-db.com/exploits/43569/?rss
[shellcode] Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
https://www.exploit-db.com/exploits/43568/?rss
Linux/x86-64 - Reverse TCP Password (doomedra) Shell (/bin/sh) (192.168.1.9:4444/TCP) Shellcode (138 bytes)
https://www.exploit-db.com/exploits/43568/?rss
[webapps] ImgHosting 1.5 - Cross-Site Scripting
ImgHosting 1.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43567/?rss
ImgHosting 1.5 - Cross-Site Scripting
https://www.exploit-db.com/exploits/43567/?rss
[remote] SysGauge Server 3.6.18 - Buffer Overflow
SysGauge Server 3.6.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43588/?rss
SysGauge Server 3.6.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43588/?rss
[webapps] RISE 1.9 - 'search' SQL Injection
RISE 1.9 - 'search' SQL Injection
https://www.exploit-db.com/exploits/43591/?rss
RISE 1.9 - 'search' SQL Injection
https://www.exploit-db.com/exploits/43591/?rss
[webapps] PerfexCRM 1.9.7 - Arbitrary File Upload
PerfexCRM 1.9.7 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43590/?rss
PerfexCRM 1.9.7 - Arbitrary File Upload
https://www.exploit-db.com/exploits/43590/?rss
[remote] Disk Pulse Enterprise 10.1.18 - Buffer Overflow
Disk Pulse Enterprise 10.1.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43589/?rss
Disk Pulse Enterprise 10.1.18 - Buffer Overflow
https://www.exploit-db.com/exploits/43589/?rss
[webapps] Adminer 4.3.1 - Server-Side Request Forgery
Adminer 4.3.1 - Server-Side Request Forgery
https://www.exploit-db.com/exploits/43593/?rss
Adminer 4.3.1 - Server-Side Request Forgery
https://www.exploit-db.com/exploits/43593/?rss