Exploit-DB
2.41K subscribers
9.31K links
Offensive Security Exploit Database
Download Telegram
[shellcode] OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
OOSX/PPC - Reverse TCP Shell (/bin/csh) Shellcode
https://www.exploit-db.com/exploits/43611/?rss
[shellcode] OSX/PPC - Remote findsock by recv() Key Shellcode
OSX/PPC - Remote findsock by recv() Key Shellcode
https://www.exploit-db.com/exploits/43610/?rss
[shellcode] OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
OSX/PPC - execve(/bin/sh,[/bin/sh],NULL) + exit() Shellcode (72 bytes)
https://www.exploit-db.com/exploits/43617/?rss
[shellcode] OSX/PPC - execve(/bin/sh) Shellcode
OSX/PPC - execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43616/?rss
[shellcode] OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
OSX/PPC - Bind TCP (8000/TCP) Shell + OSXPPCLongXOR Encoded Shellcode (300 bytes)
https://www.exploit-db.com/exploits/43615/?rss
[shellcode] OSX/PPC - Stager Sock Reverse Shellcode
OSX/PPC - Stager Sock Reverse Shellcode
https://www.exploit-db.com/exploits/43614/?rss
[shellcode] OSX/PPC - Stager Sock Find Shellcode
OSX/PPC - Stager Sock Find Shellcode
https://www.exploit-db.com/exploits/43613/?rss
[shellcode] OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
OSX/PPC - Stager Sock Find MSG_PEEK Shellcode
https://www.exploit-db.com/exploits/43612/?rss
[shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)
https://www.exploit-db.com/exploits/43618/?rss
[shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff) Shellcode (278 bytes)
https://www.exploit-db.com/exploits/43620/?rss
[shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes)
https://www.exploit-db.com/exploits/43619/?rss
[shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43622/?rss
[shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/sh) Shellcode
https://www.exploit-db.com/exploits/43621/?rss
[shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
https://www.exploit-db.com/exploits/43625/?rss
[shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
https://www.exploit-db.com/exploits/43624/?rss
[shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
Solaris/SPARC - Bind TCP Shell Shellcode
https://www.exploit-db.com/exploits/43623/?rss
[shellcode] Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 bytes)
Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 bytes)
https://www.exploit-db.com/exploits/43626/?rss
[shellcode] BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
https://www.exploit-db.com/exploits/43629/?rss
[shellcode] BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 bytes)
BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 bytes)
https://www.exploit-db.com/exploits/43628/?rss
[shellcode] BSD - setuid(0) + chroot() + execute /bin/sh Shellcode (57 bytes)
BSD - setuid(0) + chroot() + execute /bin/sh Shellcode (57 bytes)
https://www.exploit-db.com/exploits/43627/?rss