0day.today - наибольшая база данных эксплоитов в мире.
Некоторые вещи, о которых стоит знать:
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
Мы используем один основной домен 0day.today
Если Вы желаете приобрести эксплоит или заплатить за услуги - Вам необходимо приобрести Золото (Gold). Мы не хотим чтобы Вы использовали наш сайт как инструмент для взломов, поэтому любые действия, которые могут незаконно влиять на других пользователей или на сайты, к которым у Вас нет прав доступа будут запрещены и Ваш профиль со всей вложенной информацией будет уничтожен.
Администрация сайта использует официальные контакты. Опасайтесь обманщиков!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Прочитайте [ соглашение ]
- Прочитайте [ Отправить ] правила
- Посетите страницу [ faq ] page
- [ Зарегистрируйте ] профиль
- Получите [ Gold ]
- Если Вы хотите [ продать ]
- Если Вы хотите [ купить ]
- Если Вы потеряли [ Счет ]
- Любые вопросы [ [email protected] ]
- Страница авторизации
- Страница регистрации
- Страница восстановления
- Страница FAQ
- Страница контактов
- Правила публикации
- Страница с соглашением
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Вы можете связаться с нами по:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Search results for exploits by request: All
[ remote exploits ]
Remote exploits and vulnerabilities category
A "remote exploit" works over a network and exploits the security vulnerability without any prior access to the vulnerable system.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
3 471
Security Risk Critical
D
Download
C
CVE-2023-36845
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
Zyxel Firewall ZTP Unauthenticated Command Injection Exploit
Комметариев:
0
7 339
Security Risk Critical
D
Download
C
CVE-2022-30525
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
ALLPlayer ALLMediaServer V1.6 SEH Exploit
Комметариев:
0
8 413
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Achilles
Эксплоиты:
42
BusinessLevel:
8
Small HTTP Server 3.06 Remote Buffer Overflow Exploit
Комметариев:
0
9 331
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Yehia Elghaly
Эксплоиты:
25
BusinessLevel:
3
ALLMediaServer 1.6 Buffer Overflow Exploit
Комметариев:
0
8 806
Security Risk Medium
D
Download
C
CVE-2022-28381
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
ALLMediaServer 1.6 Remote Buffer Overflow Exploit
Комметариев:
0
9 075
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Yehia Elghaly
Эксплоиты:
25
BusinessLevel:
3
8 256
Security Risk Critical
D
Download
C
CVE-2021-1472
CVE-2021-1473
CVE-2021-1473
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
13 603
Security Risk Critical
D
Download
C
CVE-2021-20039
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
9 609
Security Risk Medium
D
Download
C
CVE-2021-3394
Verified by
free
You can open this exploit for free
Andrea Intilangelo
Эксплоиты:
16
BusinessLevel:
3
11 072
Security Risk High
D
Download
C
CVE-2020-1313
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
Cisco 7937G All-In-One Exploiter Exploit
Комметариев:
0
10 334
Security Risk Medium
D
Download
C
CVE-2020-16137
CVE-2020-16138
CVE-2020-16139
CVE-2020-16138
CVE-2020-16139
Verified by
free
You can open this exploit for free
Cody Martin
Эксплоиты:
3
BusinessLevel:
2
WebRTC usrsctp Incorrect Call Vulnerability
Комметариев:
0
10 022
Security Risk Medium
D
Download
C
CVE-2020-6514
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
11 596
Security Risk Critical
D
Download
C
CVE-2020-7961
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
rConfig - install Command Execution Exploit
Комметариев:
0
12 495
Security Risk Critical
D
Download
C
CVE-2019-16662
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
Cisco Small Business 220 Series - Multiple Vulnerabilities
Комметариев:
0
11 991
Security Risk High
D
Download
C
CVE-2019-1914
CVE-2019-1913
CVE-2019-1912
CVE-2019-1913
CVE-2019-1912
Verified by
free
You can open this exploit for free
bashis
Эксплоиты:
19
BusinessLevel:
5
PCMan FTP Server 2 ALLO Buffer Overflow Exploit
Комметариев:
0
10 432
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Nassim Asrir
Эксплоиты:
28
BusinessLevel:
5
7 804
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
AkkuS
Эксплоиты:
75
BusinessLevel:
7
Oracle Weblogic Server Deserialization MarshalledObject Remote Code Execution Exploit
Комметариев:
0
7 579
Security Risk Critical
D
Download
C
CVE-2016-3510
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
MikroTik RouterOS < 6.43.12 (stable) / < 6.42.12 (long-term) - Firewall and NAT Bypass
Комметариев:
0
12 107
Security Risk High
D
Download
C
CVE-2019-3924
Verified by
free
You can open this exploit for free
Jacob Baines
Эксплоиты:
17
BusinessLevel:
5
Windows Persistent Service Installer Exploit
Комметариев:
0
7 012
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Green-m
Эксплоиты:
4
BusinessLevel:
3
[ local exploits ]
Local exploits and vulnerabilities category
A "local exploit" requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with client application.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
5 907
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
George Washington
Эксплоиты:
1
BusinessLevel:
0
CrowdStrike Falcon AGENT 6.44.15806 - Uninstall without Installation Token Vulnerability
Комметариев:
0
4 073
Security Risk Medium
D
Download
C
CVE-2022-2841
Verified by
free
You can open this exploit for free
Fortunato Lodari
Эксплоиты:
3
BusinessLevel:
2
Zyxel Firewall SUID Binary Privilege Escalation Exploit
Комметариев:
0
7 836
Security Risk High
D
Download
C
CVE-2022-30526
Verified by
free
You can open this exploit for free
Martin Heiland
Эксплоиты:
8
BusinessLevel:
5
8 825
Security Risk High
D
Download
C
CVE-2021-44596
Verified by
free
You can open this exploit for free
Netanel Cohen
Эксплоиты:
3
BusinessLevel:
1
Wondershare Dr.Fone 12.0.18 - (Wondershare InstallAssist) Unquoted Service Path Vulnerability
Комметариев:
0
8 494
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Mohamed Alzhrani
Эксплоиты:
1
BusinessLevel:
1
7 346
Security Risk High
D
Download
C
CVE-2020-26950
Verified by
free
You can open this exploit for free
metasploit
Эксплоиты:
1625
BusinessLevel:
92
8 639
Security Risk Medium
D
Download
C
CVE-2020-5147
Verified by
free
You can open this exploit for free
shinnai
Эксплоиты:
159
BusinessLevel:
17
Lexmark Printer Software G2 Installation Package 1.8.0.0 - (LM__bdsvc) Unquoted Service Path
Комметариев:
0
8 610
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Julio Aviña
Эксплоиты:
7
BusinessLevel:
2
8 427
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Mayur Parmar
Эксплоиты:
6
BusinessLevel:
2
Pearson Vue VTS 2.3.1911 Installer - VUEApplicationWrapper Unquoted Service Path Vulnerability
Комметариев:
0
8 312
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
JOK3R
Эксплоиты:
3
BusinessLevel:
5
Wondershare Driver Install Service help 10.7.1.321 - (ElevationService) Unquote Service Path Vulnera
Комметариев:
0
8 274
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Luis Sandoval
Эксплоиты:
1
BusinessLevel:
2
8 243
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
SamAlucard
Эксплоиты:
15
BusinessLevel:
3
Pearson Vue VTS 2.3.1911 Installer - (VUEApplicationWrapper) Unquoted Service Path Vulnerability
Комметариев:
0
9 368
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
JOK3R
Эксплоиты:
3
BusinessLevel:
5
9 044
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Angelo D\'Amato
Эксплоиты:
1
BusinessLevel:
2
IObit Uninstaller 9.5.0.15 - (IObit Uninstaller Service) Unquoted Service Path Vulnerability
Комметариев:
0
8 613
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Gobinathan
Эксплоиты:
2
BusinessLevel:
2
9 818
Security Risk High
D
Download
C
CVE-2020-3894
Verified by
free
You can open this exploit for free
Glazvunov
Эксплоиты:
9
BusinessLevel:
3
ALLPlayer 7.6 Buffer Overflow Exploit
Комметариев:
0
8 172
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Xenofon Vassilakopoulos
Эксплоиты:
14
BusinessLevel:
3
5 895
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
antonio
Эксплоиты:
7
BusinessLevel:
6
5 834
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
antonio
Эксплоиты:
7
BusinessLevel:
6
5 572
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Sainadh Jamalpur
Эксплоиты:
6
BusinessLevel:
3
[ web applications ]
Webapplication (webapps) exploits and vulnerabilities category
This category is full with vulnerabilities, which was found in web projects and web applications.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Teacher Subject Allocation Management System 1.0 - (searchdata) SQL injection Vulnerability
Комметариев:
0
1 961
Security Risk High
D
Download
C
CVE-2023-46024
Verified by
free
You can open this exploit for free
Ersin Erenler
Эксплоиты:
3
BusinessLevel:
0
Wallos Shell Upload Vulnerability
Комметариев:
0
1 367
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
bot
Эксплоиты:
154
BusinessLevel:
13
1 545
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Melvin Mejia
Эксплоиты:
1
BusinessLevel:
0
1 232
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
whiteOwl
Эксплоиты:
1
BusinessLevel:
1
2 592
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
2 629
Security Risk Medium
D
Download
C
CVE-2023-38911
Verified by
free
You can open this exploit for free
Daniel González
Эксплоиты:
2
BusinessLevel:
0
3 287
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Ramil Mustafayev
Эксплоиты:
3
BusinessLevel:
2
TinyWebGallery v2.5 - Remote Code Execution Vulnerability
Комметариев:
0
3 298
Security Risk Critical
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
3 319
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Mirabbas Ağalarov
Эксплоиты:
51
BusinessLevel:
3
3 237
Security Risk High
D
Download
C
CVE-2023-0963
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
Music Gallery Site v1.0 - SQL Injection Vulnerability (3)
Комметариев:
0
3 208
Security Risk High
D
Download
C
CVE-2023-0962
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
Music Gallery Site v1.0 - SQL Injection Vulnerability (2)
Комметариев:
0
3 201
Security Risk High
D
Download
C
CVE-2023-0961
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
Music Gallery Site v1.0 - SQL Injection Vulnerability
Комметариев:
0
3 221
Security Risk High
D
Download
C
CVE-2023-0938
Verified by
free
You can open this exploit for free
Muhammad Navaid Zafar Ansari
Эксплоиты:
16
BusinessLevel:
1
3 117
Security Risk High
D
Download
C
CVE-2023-23156
Verified by
free
You can open this exploit for free
Yogesh Verma
Эксплоиты:
1
BusinessLevel:
1
Art Gallery Management System Project v1.0 - SQL Injection (Authenticated) Vulnerability
Комметариев:
0
2 842
Security Risk High
D
Download
C
CVE-2023-23163
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
Art Gallery Management System Project v1.0 - SQL Injection (Unauthenticated) Vulnerability
Комметариев:
0
2 842
Security Risk High
D
Download
C
CVE-2023-23162
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
Art Gallery Management System Project v1.0 - Reflected Cross-Site Scripting Vulnerability
Комметариев:
0
2 842
Security Risk Medium
D
Download
C
CVE-2023-23161
Verified by
free
You can open this exploit for free
Rahul Patwari
Эксплоиты:
3
BusinessLevel:
1
3 070
Security Risk Critical
D
Download
C
CVE-2022-1565
Verified by
free
You can open this exploit for free
AkuCyberSec
Эксплоиты:
3
BusinessLevel:
1
VIAVIWEB Wallpaper Admin 1.0 - Multiple Vulnerabilities
Комметариев:
0
2 206
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Edd13Mora
Эксплоиты:
2
BusinessLevel:
1
Music Gallery Site 1.0 Cross Site Scripting Vulnerability
Комметариев:
0
2 236
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Abdulhakim Öner
Эксплоиты:
9
BusinessLevel:
1
[ dos / poc ]
DOS exploits and vulnerabilities category
PoC DoS (denial of service exploit) it exploits remote steps to check the resistance on the affected server or software denial of service vulnerability. The purpose of these attacks is to check the server or the software for resistance.
PoC (Proof Of Concept exploit) An attack against a computer or network that is performed only to prove that it can be done. It generally does not cause any harm, but shows how a hacker can take advantage of a vulnerability in the software or possibly the hardware.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Chrome 121 Javascript Fork Malloc Bomb Exploit
Комметариев:
0
7 448
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Georgi Guninski
Эксплоиты:
16
BusinessLevel:
11
qubes-mirage-firewall v0.8.3 - Denial Of Service Exploit
Комметариев:
0
4 497
Security Risk Medium
D
Download
C
CVE-2022-46770
Verified by
free
You can open this exploit for free
Krzysztof Burghardt
Эксплоиты:
4
BusinessLevel:
3
4 946
Security Risk Medium
D
Download
C
CVE-2022-42905
Verified by
free
You can open this exploit for free
Maximilian Ammann
Эксплоиты:
3
BusinessLevel:
1
Noise-Java AESGCMFallbackCipherState.encryptWithAd() Insufficient Boundary Checks Exploit
Комметариев:
0
8 977
Security Risk Medium
D
Download
C
CVE-2020-25022
Verified by
free
You can open this exploit for free
Pietro Oliva
Эксплоиты:
16
BusinessLevel:
8
Internet Explorer - Use-After-Free in JScript Arguments During toJSON Callback Exploit
Комметариев:
0
16 673
Security Risk Medium
D
Download
C
CVE-2019-1429
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
macOS XNU - Missing Locking in checkdirs_callback() Enables Race with fchdir_common() Exploit
Комметариев:
0
18 474
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
16 339
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
iMessage - NSKeyedUnarchiver Deserialization Allows file Backed NSData Objects Exploit
Комметариев:
0
12 350
Security Risk Medium
D
Download
C
CVE-2019-8646
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Google Chrome V8 - Turbofan JSCallReducer::ReduceArrayIndexOfIncludes Out-of-Bounds Read/Write
Комметариев:
0
11 915
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Linux Kernel 4.4 (Ubuntu 16.04) - snd_timer_user_ccallback() Kernel Pointer Leak Exploit
Комметариев:
0
11 515
Security Risk Medium
D
Download
C
CVE-2016-4578
Verified by
free
You can open this exploit for free
wally0813
Эксплоиты:
2
BusinessLevel:
3
12 557
Security Risk Medium
D
Download
C
CVE-2019-2025
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
macOS < 10.14.3 / iOS < 12.1.3 - Arbitrary mach Port Name Deallocation in XPC Services due to
Комметариев:
0
8 436
Security Risk Medium
D
Download
C
CVE-2019-6218
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
2 907
Security Risk Medium
D
Download
C
CVE-2018-4382
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 908
Security Risk Medium
D
Download
C
CVE-2018-8288
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
4 603
Security Risk Medium
D
Download
C
CVE-2018-10906
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
3 159
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
Allok Video Splitter 3.1.12.17 - Denial of Service Exploit
Комметариев:
0
3 092
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Achilles
Эксплоиты:
42
BusinessLevel:
8
3 112
Security Risk Medium
D
Download
C
CVE-2018-6065
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
macOS 10.13.2 - Double mach_port_deallocate in kextd due to Failure to Comply with MIG Ownership Rul
Комметариев:
0
3 342
Security Risk Medium
D
Download
C
CVE-2018-4139
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
2 802
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Google Security Research
Эксплоиты:
1019
BusinessLevel:
56
[ shellcode ]
Shellcode category
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine, but any piece of code that performs a similar task can be called shellcode. Because the function of a payload is not limited to merely spawning a shell, some have suggested that the name shellcode is insufficient. Shellcode is commonly written in machine code.
Classification:
There are several methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A remote exploit works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A local exploit requires prior access to the vulnerable system and usually increases the privileges of the person running the exploit past those granted by the system administrator. Exploits against client applications also exist, usually consisting of modified servers that send an exploit if accessed with a client application. Exploits against client applications may also require some interaction with the user and thus may be used in combination with the social engineering method. Another classification is by the action against the vulnerable system; unauthorized data access, arbitrary code execution, and denial of service are examples. Many exploits are designed to provide superuser-level access to a computer system. However, it is also possible to use several exploits, first to gain low-level access, then to escalate privileges repeatedly until one reaches root. Normally a single exploit can only take advantage of a specific software vulnerability. Often, when an exploit is published, the vulnerability is fixed through a patch and the exploit becomes obsolete until newer versions of the software become available Shellcodes any types.
-::DATE
-::DESCRIPTION
-::TYPE
-::HITS
-::RISK
-::GOLD
-::AUTHOR
Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
Комметариев:
0
10 977
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Bobby Cooke
Эксплоиты:
26
BusinessLevel:
3
Windows/x86 - MSVCRT System + Add RDP Admin + Disable Firewall + Enable RDP Shellcode (644 Bytes)
Комметариев:
0
14 637
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
boku
Эксплоиты:
42
BusinessLevel:
4
12 917
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
kiriknik
Эксплоиты:
1
BusinessLevel:
4
13 265
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
strider
Эксплоиты:
11
BusinessLevel:
3
Linux/x86 - Kill All Processes Shellcode (14 bytes)
Комметариев:
0
13 852
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
strider
Эксплоиты:
11
BusinessLevel:
3
12 423
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
zbt
Эксплоиты:
4
BusinessLevel:
7
FreeBSD/x86 - //sbin/pfctl -F all Shellcode (47 bytes)
Комметариев:
0
12 118
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
antrhacks
Эксплоиты:
10
BusinessLevel:
8
Linux/x86_64 - kill All Processes Shellcode (19 bytes)
Комметариев:
0
15 007
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
Touhid M.Shaikh
Эксплоиты:
27
BusinessLevel:
5
Linux/x86-64 - Syscall Persistent Bind Shell + Multi-terminal + Password + Daemon Shellcode (83, 148
Комметариев:
0
10 872
Security Risk High
D
Download
-
Verified by
free
You can open this exploit for free
kyzer
Эксплоиты:
6
BusinessLevel:
5
Allwin URLDownloadToFile + WinExec + ExitProcess Shellcode
Комметариев:
0
16 348
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
RubberDuck
Эксплоиты:
3
BusinessLevel:
7
12 869
Security Risk Medium
D
Download
-
Verified by
free
You can open this exploit for free
nitr0us
Эксплоиты:
15
BusinessLevel:
10
linux/x86 - /usr/bin/killall snort - 46 bytes
Комметариев:
0
12 144
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
John Babio
Эксплоиты:
5
BusinessLevel:
7
FreeBSD/x86 SmallBind TCP on port 31337 - ShellCode 27 Bytes
Комметариев:
0
13 815
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
KedAns-Dz
Эксплоиты:
292
BusinessLevel:
24
11 419
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
RubberDuck
Эксплоиты:
3
BusinessLevel:
7
windows Mobile 6.5 TR Phone Call Shellcode
Комметариев:
0
4 948
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
Celil Ünüver
Эксплоиты:
4
BusinessLevel:
7
linux/x86 find all writeable folder in filesystem 91 bytes
Комметариев:
0
5 372
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
5 196
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
4 853
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
linux/x86 delete all data on filesystem shellcode
Комметариев:
0
4 721
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10
4 672
Security Risk Unsored
D
Download
-
Not verified yet
free
You can open this exploit for free
gunslinger_
Эксплоиты:
53
BusinessLevel:
10