.NET runtime optimization service privilege escalation exploit that leverages the fact that the service's EXE file can be overwritten by any non-admin domain user and local power users. This exploit compiles to a service that uses the original service's id.
744f7672e14b5f0fc0764ea74c1519e7a0ebfe6e8883fc42b8bab17499280a19
166 bytes small shellcode that forks a HTTP server on TCP port 8800 for Linux/x86.
3c7783b2229faa163f1c29f384bade4f347204591c90d48e78b26b434139de05
Self modifying shellcode for IDS evasion that is 64 bytes for Linux/x86.
b73cd03cf13d0098577b931e7e79678d627ea29f1884d2579693ad5888ee90f0
Linux/x86 listens for shellcode on tcp/5555 and jumps to it.
592cc0af040a0d02896aad332ea74a6d3f35bef6cab581052cce6adf1a8f4b18
295 bytes of Linux/x86 shellcode that appends a RSA key to /root/.ssh/authorized_keys2.
daf38163f2ce60d4025acdcf4ed49f89ec6009e7d69abc71e6bb166cc0fc0d36
151 bytes of Linux/x86 connect-back shellcode that uses UDP port 54321 and executes tcpdump.
43697f2423432246a3de3022253c59fbb3331f2b592eabd562c28e4a731f5a8e
Ho' Detector is shellcode that detects sniffing on all interfaces in Linux by parsing /proc/net/packet.
42c881bd2e0d0ad6f16b4cdc86b99656d1572c15c7ee38cf830dbce602f77508
No-IP DUC versions 2.1.7 and below remote code execution exploit with reverse shell functionality.
45aef2f944054e07955c8413368b1c84c98946f115baffb32a912c5e292375fa
The freePBX portal suffers from a code injection vulnerability.
a2e596e2bad7afaf4a47ed5660152d7bc204011095c3ed77e31195f38309765b
FreePBX version 2.2.x suffers from cross site scripting vulnerabilities in the handling of various fields sent in messages that are parsed by the Asterisk log file tools.
1b01a3de2d59f35efc759c3a668fc6e4ed3982db5a634260ff1a851695386f03