المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56

  1. [webapps] Dodocool DC38 N300 - Cross-site Request Forgery
  2. [shellcode] Linux/x86 - Disable ASLR Security Obfuscated Shellcode (23 bytes)
  3. [webapps] ManageEngine OpManager / Social IT Plus / IT360 - Multiple Vulnerabilities
  4. [webapps] ManageEngine Netflow Analyzer / IT360 - Arbitrary File Download
  5. [webapps] ManageEngine OpManager / Applications Manager / IT360 - 'FailOverServlet' M
  6. [webapps] ManageEngine EventLog Analyzer - Multiple Vulnerabilities (2)
  7. [webapps] ManageEngine Desktop Central / Desktop Central MSP - Create Administrator
  8. [dos] Lorex LH300 Series - ActiveX Buffer Overflow (PoC)
  9. [shellcode] Linux/x86 - execve(/bin/sh) + ROT-N + Shift-N + XOR-N Encoded Shellcode (
  10. [webapps] CMS Made Simple 1.11.9 - Multiple Vulnerabilities
  11. [webapps] GetSimple CMS 3.3.1 - Cross-Site Scripting
  12. [local] ICU library 52 < 54 - Multiple Vulnerabilities
  13. [webapps] Pimcore CMS 1.4.9
  14. [webapps] SysAid Help Desk 14.4 - Multiple Vulnerabilities
  15. [webapps] Billion / TrueOnline / ZyXEL Routers - Multiple Vulnerabilities
  16. [webapps] BMC Track-It! 11.4 - Multiple Vulnerabilities
  17. [webapps] Kaseya Virtual System Administrator (VSA) 7.0 < 9.1 - Authenticated Arbitra
  18. [remote] AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Executio
  19. [papers] HackSysTeam Windows Kernel Vulnerable Driver: Type Confusion Vulnerability E
  20. [local] Blizzard Update Agent - JSON RPC DNS Rebinding
  21. [local] Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
  22. [remote] GoAhead Web Server - LD_PRELOAD Arbitrary Module Load (Metasploit)
  23. [remote] Kaltura - Remote PHP Code Execution over Cookie (Metasploit)
  24. [local] Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit)
  25. [webapps] WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclo
  26. [remote] RAVPower 2.000.056 - Root Remote Code Execution
  27. [webapps] Professional Local Directory Script 1.0 - SQL Injection
  28. [papers] Hardcore SAP Penetration Testing
  29. [webapps] Flexible Poll 1.2 - SQL Injection
  30. [webapps] Quickad 4.0 - SQL Injection
  31. [webapps] Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
  32. [webapps] Tumder 2.1 - SQL Injection
  33. [webapps] Zechat 1.5 - SQL Injection
  34. [webapps] Wchat 1.5 - SQL Injection
  35. [webapps] Easy Car Script 2014 - SQL Injection
  36. [webapps] RSVP Invitation Online 1.0 - Cross-Site Request Forgery (Update Admin)
  37. [webapps] Affiligator 2.1.0 - SQL Injection
  38. [webapps] LiveCRM SaaS Cloud 1.0 - SQL Injection
  39. [local] HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
  40. [webapps] NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download
  41. [papers] Hardcore SAP Penetration Testing
  42. [webapps] CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection
  43. [dos] RAVPower 2.000.056 - Memory Disclosure
  44. [dos] MixPad 5.00 - Buffer Overflow
  45. [papers] Metasploit Pivoting
  46. [webapps] OTRS 5.0.x/6.0.x - Remote Command Execution
  47. [webapps] PHPFreeChat 1.7 - Denial of Service
  48. [papers] Metasploit Pivoting
  49. [webapps] CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities
  50. [webapps] Shopware 5.2.5/5.3 - Cross-Site Scripting
  51. [webapps] Oracle JDeveloper 11.1.x/12.x - Directory Traversal
  52. [webapps] DarkComet (C2 Server) - File Upload
  53. [webapps] D-Link DNS-325 ShareCenter < 1.05B03 - Multiple Vulnerabilities
  54. [webapps] D-Link DNS-343 ShareCenter < 1.05 - Command Injection
  55. [webapps] Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
  56. [webapps] Mambo < 4.5.4 - SQL Injection
  57. [webapps] X-Cart < 4.1.3 - Arbitrary Variable Overwrite
  58. [webapps] Claroline < 1.7.7 - Arbitrary File Inclusion
  59. [webapps] CubeCart < 3.0.12 - Multiple Vulnerabilities
  60. [webapps] SquirrelMail < 1.4.7 - Arbitrary Variable Overwrite
  61. [webapps] PHPLib < 7.4 - SQL Injection
  62. [webapps] Gallery 2 < 2.0.2 - Multiple Vulnerabilities
  63. [webapps] phpRPC < 0.7 - Remote Code Execution
  64. [webapps] Mambo < 4.5.3h - Multiple Vulnerabilities
  65. [webapps] PEAR LiveUser < 0.16.8 - Arbitrary File Access
  66. [webapps] Geeklog < 1.4.0 - Multiple Vulnerabilities
  67. [webapps] ADOdb < 4.71 - Cross Site Scripting
  68. [webapps] XPCOM - Race Condition
  69. [webapps] SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
  70. [webapps] PHPXMLRPC < 1.1 - Remote Code Execution
  71. [webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
  72. [webapps] XOOPS < 2.0.11 - Multiple Vulnerabilities
  73. [dos] Peercast < 0.1211 - Format String
  74. [webapps] Burning Board < 2.3.1 - SQL Injection
  75. [webapps] Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities
  76. [webapps] AZBB < 1.0.07d - Multiple Vulnerabilities
  77. [webapps] PhotoPost < 4.85 - Multiple Vulnerabilities
  78. [webapps] TikiWiki < 1.8.1 - Multiple Vulnerabilities
  79. [webapps] PhotoPost < 4.6 - Multiple Vulnerabilities
  80. [webapps] Invision Gallery < 1.0.1 - SQL Injection
  81. [webapps] Invision Power Top Site List < 1.1 RC 2 - SQL Injection
  82. [webapps] phpBB < 2.0.7a - Multiple Vulnerabilities
  83. [webapps] Mambo < 4.5 - Multiple Vulnerabilities
  84. [webapps] vBulletin < 3.0.0 RC4 - Cross Site Scripting
  85. [webapps] Phorum < 5.0.3 Beta - Cross Site Scripting
  86. [webapps] phpBB < 2.0.6d - Cross Site Scripting
  87. [webapps] Invision Power Board (IP.Board) < 1.3 - SQL Injection
  88. [local] Trillian Pro < 2.01 - Design Error
  89. [webapps] phpShop < 0.6.1-b - Multiple Vulnerabilities
  90. [webapps] phpGedView < 2.65 beta 5 - Multiple Vulnerabilities
  91. [webapps] MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities
  92. [webapps] PostNuke < 0.726 Phoenix - Multiple Vulnerabilities
  93. [webapps] osCommerce < 2.2-MS2 - Multiple Vulnerabilities
  94. [webapps] ASPapp Multiple Products - Multiple Vulnerabilities
  95. [webapps] AutoRank PHP < 2.0.4 - SQL Injection (PoC)
  96. [webapps] Aardvark Topsites < 4.1.0 - Multiple Vulnerabilities
  97. [webapps] Invision Power Board (IP.Board) < 2.0 Alpha 3 - SQL Injection (PoC)
  98. [webapps] Invision Power Top Site List < 2.0 Alpha 3 - SQL Injection (PoC)
  99. [webapps] DUWare Multiple Products - Multiple Vulnerabilities
  100. [papers] [Kernel Exploitation] 6: NULL pointer dereference
  101. [papers] [Kernel Exploitation] 5: Integer Overflow
  102. [papers] [Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
  103. [papers] [Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
  104. [papers] [Kernel Exploitation] 2: Payloads
  105. [papers] [Kernel Exploitation] 1: Setting up the environment
  106. [dos] macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking
  107. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password
  108. [webapps] GitStack 2.3.10 - Unauthenticated Remote Code Execution
  109. [dos] Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
  110. [local] glibc - 'getcwd()' Local Privilege Escalation
  111. [shellcode] Windows/x86 (XP SP3) - MessageBox Shellcode (11 bytes)
  112. [shellcode] Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes)
  113. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (42 bytes)
  114. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
  115. [shellcode] Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
  116. [shellcode] Windows/x86 (XP SP3) (Turkish) - MessageBoxA Shellcode (109 bytes)
  117. [shellcode] Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
  118. [shellcode] Windows/x86 - calc.exe + Null-Free Shellcode (100 bytes)
  119. [shellcode] Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null
  120. [shellcode] Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes
  121. [shellcode] Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes)
  122. [shellcode] Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes
  123. [shellcode] Windows/x86 (XP SP3) (French) - Sleep 90 Seconds Shellcode (14 bytes)
  124. [shellcode] Windows/x86 - Create Admin User (X) Shellcode (304 bytes)
  125. [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampi
  126. [shellcode] Windows/x86 (NT/XP/2000/2003) - Bind TCP (8721/TCP) Shell Shellcode (356
  127. [shellcode] Linux/x86 - ROT-7 Encodor + Decoder execve Shellcode (74 bytes)
  128. [shellcode] Linux/x86 - setreuid() + execve(/usr/bin/python) Shellcode (54 bytes)
  129. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)
  130. [shellcode] Linux/x86 - Bind TCP (1337/TCP) Shell Shellcode (89 bytes)
  131. [shellcode] Linux/x86 - shutdown -h now Shellcode (56 bytes)
  132. [shellcode] Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
  133. [shellcode] Linux/x86 - JMP-FSTENV execve Shellcode (67 bytes)
  134. [shellcode] Linux/x86 - shift-bit execve Encoder Shellcode (114 bytes)
  135. [shellcode] Linux/x86 - Copy /etc/passwd to /tmp/outfile Shellcode (97 bytes)
  136. [shellcode] Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
  137. [shellcode] Linux/x86 - Download (http://192.168.2.222/x) + chmod() + execute Shellco
  138. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (
  139. [shellcode] Linux/x86 - Bind TCP Shell Shellcode (112 bytes)
  140. [shellcode] Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (30 bytes)
  141. [shellcode] Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
  142. [shellcode] Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
  143. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell Shellcode (108 bytes)
  144. [shellcode] Linux/x86 - Uzumaki Encryptor Shellcode (Generator)
  145. [shellcode] Linux/x86 - execve(/bin/shUzumaki) + Uzumaki Encoded + Null-Free Shellcod
  146. [shellcode] Linux/x86 - execve wget + Mutated + Null-Free Shellcode (96 bytes)
  147. [shellcode] Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
  148. [shellcode] Linux/x86 - Reboot + Mutated + Null-Free Shellcode (55 bytes)
  149. [shellcode] Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
  150. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (6)
  151. [shellcode] Linux/x86 - Insertion Decoder Shellcode (33+ bytes)
  152. [webapps] Primefaces 5.x - Remote Code Execution (Metasploit)
  153. [shellcode] Linux/x86 - Egg Hunter Shellcode (38 bytes)
  154. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  155. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell Shellcode (73 bytes)
  156. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + GetPC/Call/Ret Method Shellcode (
  157. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (65 bytes)
  158. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:55555/TCP) Shell Shellcode (72 bytes)
  159. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + SO_REUSEADDR Set (Avoiding SIGSEG
  160. [shellcode] Linux/x86 - Force Reboot Shellcode (36 bytes)
  161. [shellcode] Linux/x86 - execve(chmod 0777 /etc/shadow) Shellcode (57 bytes)
  162. [dos] Microsoft Edge Chakra JIT - Stack-to-Heap Copy
  163. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (23 bytes) (2)
  164. [shellcode] Linux/x86 - iptables --flush Shellcode (43 bytes)
  165. [dos] Microsoft Edge Chakra - 'AsmJSByteCodeGenerator::EmitCall' Out-of-Bounds Read
  166. [shellcode] Linux/x86 - Stager Reads Second Stage From STDIN Shellcode (14 bytes)
  167. [dos] Microsoft Edge Chakra JIT - Out-of-Bounds Write
  168. [dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes (2)
  169. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (28 bytes)
  170. [dos] Microsoft Edge Chakra - Incorrect Scope Handling
  171. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/zsh", [/bin/zsh, NULL]) + XOR En
  172. [dos] Microsoft Edge Chakra - 'JavascriptGeneratorFunction::GetPropertyBuiltIns' Type
  173. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/ksh", [/bin/ksh, NULL]) + XOR En
  174. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/csh", [/bin/csh, NULL]) + XOR En
  175. [dos] Microsoft Edge Chakra JIT - Incorrect Bounds Calculation
  176. [shellcode] Linux/x86 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shel
  177. [shellcode] Linux/x86 - setreuid() + /sbin/iptables -F + exit(0) Shellcode (76 bytes)
  178. [shellcode] Linux/x86 - mkdir(hacked) + exit() Shellcode (36 bytes)
  179. [shellcode] Linux/x86 - /etc/init.d/apparmor teardown Shellcode (53 bytes)
  180. [shellcode] Linux/x86 - execve(/bin/cat, /etc/shadow, NULL) Shellcode (42 bytes)
  181. [shellcode] Linux/x86 - execve(/bin/dash) Shellcode (49 bytes)
  182. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (5)
  183. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (3)
  184. [shellcode] Linux/x86 - /usr/bin/killall snort Shellcode (46 bytes)
  185. [shellcode] Linux/x86 - /sbin/iptables -POUTPUT DROP Shellcode (60 bytes)
  186. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell + Polymorphic Shellcode (125 bytes
  187. [shellcode] Linux/x86 - CDRom Ejecting + Polymorphic Shellcode (74 bytes)
  188. [shellcode] Linux/x86 - chmod(/etc/shadow, 0666) + ASCII Shellcode (443 bytes)
  189. [shellcode] Linux/x86 - Force unmount /media/disk Shellcode (33 bytes)
  190. [shellcode] Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
  191. [remote] Master IP CAM 01 - Multiple Vulnerabilities
  192. [shellcode] Linux/x86 - sys_setdomainname("th1s s3rv3r h4s b33n h1j4ck3d !!") Shellco
  193. [shellcode] Linux/x86 - sys_rmdir("/tmp/willdeleted") Shellcode (41 bytes)
  194. [shellcode] Linux/x86 - sys_execve(/bin/sh, -c, ping localhost) Shellcode (55 bytes)
  195. [shellcode] Linux/x86 - sys_sync Shellcode (6 bytes)
  196. [shellcode] Linux/x86 - sys_exit(0) Shellcode (8 bytes)
  197. [shellcode] Linux/x86 - sys_sethostname(PwNeD !!, 8) Shellcode (32 bytes)
  198. [shellcode] Linux/x86 - CDRom Ejecting Shellcode (46 bytes)
  199. [shellcode] Linux/x86 - Remote File Download Shellcode (42 bytes)
  200. [shellcode] Linux/x86 - pwrite(/etc/shadow, (md5 hash of agix), 32, 8) Shellcode (89
  201. [webapps] SugarCRM 3.5.1 - Cross-Site Scripting
  202. [webapps] Belkin N600DB Wireless Router - Multiple Vulnerabilities
  203. [shellcode] Linux/x86 - setuid(0) + chmod(/etc/shadow, 0666) Shellcode (37 bytes)
  204. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh, 0, 0) Shellcode (27 bytes)
  205. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (29 bytes)
  206. [webapps] D-Link DSL-2640R - Unauthenticated DNS Change
  207. [shellcode] Linux/x86 - /sbin/iptables --flush Shellcode (69 bytes)
  208. [webapps] Reservo Image Hosting Script 1.5 - Cross-Site Scripting
  209. [shellcode] Linux/x86 - Bind TCP (45295/TCP) Shell (/bin/sh) + fork() Shellcode (131
  210. [shellcode] Linux/x86 - Reverse TCP (www.netric.org:45295/TCP) Shell (/bin/sh) Shellc
  211. [shellcode] Linux/x86 - setresuid(0,0,0) + execve(/bin/sh) + exit() Shellcode (41 byt
  212. [shellcode] Linux/x86 - socket-proxy Shellcode (372 bytes) (Generator)
  213. [shellcode] Linux/x86 - chmod(/bin/sh,04775) + set sh +s Shellcode (31 bytes)
  214. [shellcode] Linux/x86 - setuid() + execve() + exit() Shellcode (44 bytes)
  215. [shellcode] Linux/x86 - Add Root User To /etc/passwd + No Password + exit() Shellcode
  216. [shellcode] Linux/x86 - execve(/bin/ash) + exit Shellcode (34 bytes)
  217. [webapps] Zomato Clone Script - Arbitrary File Upload
  218. [shellcode] Linux/x86 - execve(/bin/sh /tmp/p00p) Shellcode (70 bytes)
  219. [remote] Transmission - RPC DNS Rebinding
  220. [shellcode] Linux/x86 - execve(/sbin/iptables -F) Shellcode (70 bytes)
  221. [shellcode] Linux/x86 - execve(/sbin/ipchains -F) Shellcode (70 bytes)
  222. [shellcode] Linux/x86 - Add Root User (w000t) + No Password Shellcode (177 bytes)
  223. [shellcode] Linux/x86 - Audio (knock knock knock) via /dev/dsp + setreuid(0,0) + exec
  224. [shellcode] Linux/x86 - fork() + setreuid(0, 0) + execve(cp /bin/sh /tmp/sh; chmod 47
  225. [remote] Seagate Personal Cloud - Multiple Vulnerabilities
  226. [shellcode] Linux/x86 - execve(/bin/sh,0,0) Shellcode (21 bytes)
  227. [shellcode] Linux/x86 - setuid(0) + execve("/bin/sh",0,0) Shellcode (28 bytes)
  228. [shellcode] Linux/x86 - Bind TCP (64713/TCP) Shell (/bin/sh) Shellcode (83 bytes)
  229. [shellcode] Linux/x86 - execve(/sbin/halt,/sbin/halt) Shellcode (27 bytes)
  230. [shellcode] Linux/x86 - execve(/sbin/reboot,/sbin/reboot) Shellcode (28 bytes)
  231. [shellcode] Linux/x86 - execve(/sbin/shutdown,/sbin/shutdown 0) Shellcode (36 bytes)
  232. [shellcode] Linux/x86 - setuid(0) + setgid(0) + execve(/bin/sh,[/bin/sh,NULL])) Shell
  233. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh,0) Shellcode (25 bytes)
  234. [shellcode] Linux/x86 - exit(0) / exit(1) Shellcode (3/4 bytes)
  235. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (27 bytes)
  236. [shellcode] Linux/x86 - Disable Shadowing Shellcode (42 bytes)
  237. [shellcode] Linux/x86 - Add Root User (w00w00) To /etc/passwd Shellcode (104 bytes)
  238. [shellcode] Linux/x86 - Bind TCP (3879/TCP) Shell (/bin/sh) Shellcode (113 bytes)
  239. [shellcode] BSD/x86 - execve(/bin/sh) Shellcode (28 bytes)
  240. [shellcode] BSD/x86 - execve(/bin/sh) + seteuid(0) Shellcode (31 bytes)
  241. [shellcode] Linux/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes
  242. [shellcode] BSD/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes)
  243. [shellcode] Linux/x86 - symlink /bin/sh sh Shellcode (36 bytes)
  244. [shellcode] BSD/x86 - symlink /bin/sh sh Shellcode (39 bytes)
  245. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (58 bytes)
  246. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) + exit() Shellcode (
  247. [shellcode] Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) + exit() Shellcode (
  248. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)
  249. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
  250. [shellcode] OpenBSD/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (74 byt