时间标题CVE编号分类作者

N/A Linux/x86 - Socket-proxy Shellcode (372 bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Windows - Reverse (127.0.0.1:123/TCP) Shell + Alphanumeric Shellcode (Encoder/Decoder) (Generator)

-
Exploit-DB
exploitexploit

N/A Solaris/MIPS - Reverse (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traffic Shellcode (600 bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Multiple keys XOR Encoder / Decoder execve(/bin/sh) Shellcode (59 bytes)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - Multi-Format Encoding Tool Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Rabbit Encoder Shellcode (200 bytes)

-
Exploit-DB
exploitexploit

N/A Linux/x64 - Reverse (/TCP) Shell (/bin/bash) + Semi-Stealth Shellcode (88+ bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Windows/x86 (XP Pro SP3) - Download File Via TFTP + Execute Shellcode (51-60 bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Windows/x64 (XP) - Download File + Execute Shellcode Using PowerShell (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/ARM - execve("/bin/sh", ["/bin/sh"], NULL) + Polymorphic Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Windows (XP < 10) - Command Generator WinExec() + Null-Free Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Command Generator + Null-Free Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - execve() + Null-Free Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Windows (XP SP3) (Spanish) - URLDownloadToFileA() + CreateProcessA() + ExitProcess() Shellcode (176+ bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Windows - Download File + Execute Via DNS + IPv6 Shellcode (Generator) (Metasploit)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Bind (1234/TCP) Shell (/bin/sh) Shellcode (87 bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Windows/x86 - Download File + Execute Shellcode (Browsers Edition) (275+ bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A ARM - Add Root User Shellcode (66+ bytes) (Generator) (Metasploit)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Custom execve() + 'Followtheleader' Shellcode (Encoder/Decoder) (Generator)

-
Exploit-DB
exploitexploit

N/A Linux - execve(/bin/sh) + Polymorphic + Printable ASCII Characters Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x64 - execve() Assembly Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Uzumaki Encryptor Shellcode (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - HTTP/1.x Requests Shellcode (18+/26+ bytes) (Generator)

-
Exploit-DB
exploitexploit

N/A Linux/x86 - Shellcode Obfuscator + Null-Free (Generator)

-
Exploit-DB
exploitexploit
个人中心
购物车
优惠劵
今日签到
有新私信 私信列表
搜索