المساعد الشخصي الرقمي

مشاهدة النسخة كاملة : exploit database


الصفحات : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 [16] 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60

  1. [webapps] BMC Track-It! 11.4 - Multiple Vulnerabilities
  2. [webapps] Kaseya Virtual System Administrator (VSA) 7.0 < 9.1 - Authenticated Arbitra
  3. [remote] AsusWRT Router < 3.0.0.4.380.7743 - Unauthenticated LAN Remote Code Executio
  4. [papers] HackSysTeam Windows Kernel Vulnerable Driver: Type Confusion Vulnerability E
  5. [local] Blizzard Update Agent - JSON RPC DNS Rebinding
  6. [local] Oracle VirtualBox < 5.1.30 / < 5.2-rc1 - Guest to Host Escape
  7. [remote] GoAhead Web Server - LD_PRELOAD Arbitrary Module Load (Metasploit)
  8. [remote] Kaltura - Remote PHP Code Execution over Cookie (Metasploit)
  9. [local] Sync Breeze Enterprise 9.5.16 - Import Command Buffer Overflow (Metasploit)
  10. [webapps] WordPress Plugin Email Subscribers & Newsletters 3.4.7 - Information Disclo
  11. [remote] RAVPower 2.000.056 - Root Remote Code Execution
  12. [webapps] Professional Local Directory Script 1.0 - SQL Injection
  13. [papers] Hardcore SAP Penetration Testing
  14. [webapps] Flexible Poll 1.2 - SQL Injection
  15. [webapps] Quickad 4.0 - SQL Injection
  16. [webapps] Photography CMS 1.0 - Cross-Site Request Forgery (Add Admin)
  17. [webapps] Tumder 2.1 - SQL Injection
  18. [webapps] Zechat 1.5 - SQL Injection
  19. [webapps] Wchat 1.5 - SQL Injection
  20. [webapps] Easy Car Script 2014 - SQL Injection
  21. [webapps] RSVP Invitation Online 1.0 - Cross-Site Request Forgery (Update Admin)
  22. [webapps] Affiligator 2.1.0 - SQL Injection
  23. [webapps] LiveCRM SaaS Cloud 1.0 - SQL Injection
  24. [local] HP Connected Backup 8.6/8.8.6 - Local Privilege Escalation
  25. [webapps] NEC Univerge SV9100/SV8100 WebPro 10.0 - Configuration Download
  26. [papers] Hardcore SAP Penetration Testing
  27. [webapps] CentOS Web Panel 0.9.8.12 - 'row_id' / 'domain' SQL Injection
  28. [dos] RAVPower 2.000.056 - Memory Disclosure
  29. [dos] MixPad 5.00 - Buffer Overflow
  30. [papers] Metasploit Pivoting
  31. [webapps] OTRS 5.0.x/6.0.x - Remote Command Execution
  32. [webapps] PHPFreeChat 1.7 - Denial of Service
  33. [papers] Metasploit Pivoting
  34. [webapps] CentOS Web Panel 0.9.8.12 - Multiple Vulnerabilities
  35. [webapps] Shopware 5.2.5/5.3 - Cross-Site Scripting
  36. [webapps] Oracle JDeveloper 11.1.x/12.x - Directory Traversal
  37. [webapps] DarkComet (C2 Server) - File Upload
  38. [webapps] D-Link DNS-325 ShareCenter < 1.05B03 - Multiple Vulnerabilities
  39. [webapps] D-Link DNS-343 ShareCenter < 1.05 - Command Injection
  40. [webapps] Synology Photostation < 6.7.2-3429 - Multiple Vulnerabilities
  41. [webapps] Mambo < 4.5.4 - SQL Injection
  42. [webapps] X-Cart < 4.1.3 - Arbitrary Variable Overwrite
  43. [webapps] Claroline < 1.7.7 - Arbitrary File Inclusion
  44. [webapps] CubeCart < 3.0.12 - Multiple Vulnerabilities
  45. [webapps] SquirrelMail < 1.4.7 - Arbitrary Variable Overwrite
  46. [webapps] PHPLib < 7.4 - SQL Injection
  47. [webapps] Gallery 2 < 2.0.2 - Multiple Vulnerabilities
  48. [webapps] phpRPC < 0.7 - Remote Code Execution
  49. [webapps] Mambo < 4.5.3h - Multiple Vulnerabilities
  50. [webapps] PEAR LiveUser < 0.16.8 - Arbitrary File Access
  51. [webapps] Geeklog < 1.4.0 - Multiple Vulnerabilities
  52. [webapps] ADOdb < 4.71 - Cross Site Scripting
  53. [webapps] XPCOM - Race Condition
  54. [webapps] SquirrelMail < 1.4.5-RC1 - Arbitrary Variable Overwrite
  55. [webapps] PHPXMLRPC < 1.1 - Remote Code Execution
  56. [webapps] PEAR XML_RPC < 1.3.0 - Remote Code Execution
  57. [webapps] XOOPS < 2.0.11 - Multiple Vulnerabilities
  58. [dos] Peercast < 0.1211 - Format String
  59. [webapps] Burning Board < 2.3.1 - SQL Injection
  60. [webapps] Invision Power Board (IP.Board) < 2.0.3 - Multiple Vulnerabilities
  61. [webapps] AZBB < 1.0.07d - Multiple Vulnerabilities
  62. [webapps] PhotoPost < 4.85 - Multiple Vulnerabilities
  63. [webapps] TikiWiki < 1.8.1 - Multiple Vulnerabilities
  64. [webapps] PhotoPost < 4.6 - Multiple Vulnerabilities
  65. [webapps] Invision Gallery < 1.0.1 - SQL Injection
  66. [webapps] Invision Power Top Site List < 1.1 RC 2 - SQL Injection
  67. [webapps] phpBB < 2.0.7a - Multiple Vulnerabilities
  68. [webapps] Mambo < 4.5 - Multiple Vulnerabilities
  69. [webapps] vBulletin < 3.0.0 RC4 - Cross Site Scripting
  70. [webapps] Phorum < 5.0.3 Beta - Cross Site Scripting
  71. [webapps] phpBB < 2.0.6d - Cross Site Scripting
  72. [webapps] Invision Power Board (IP.Board) < 1.3 - SQL Injection
  73. [local] Trillian Pro < 2.01 - Design Error
  74. [webapps] phpShop < 0.6.1-b - Multiple Vulnerabilities
  75. [webapps] phpGedView < 2.65 beta 5 - Multiple Vulnerabilities
  76. [webapps] MetaDot < 5.6.5.4b5 - Multiple Vulnerabilities
  77. [webapps] PostNuke < 0.726 Phoenix - Multiple Vulnerabilities
  78. [webapps] osCommerce < 2.2-MS2 - Multiple Vulnerabilities
  79. [webapps] ASPapp Multiple Products - Multiple Vulnerabilities
  80. [webapps] AutoRank PHP < 2.0.4 - SQL Injection (PoC)
  81. [webapps] Aardvark Topsites < 4.1.0 - Multiple Vulnerabilities
  82. [webapps] Invision Power Board (IP.Board) < 2.0 Alpha 3 - SQL Injection (PoC)
  83. [webapps] Invision Power Top Site List < 2.0 Alpha 3 - SQL Injection (PoC)
  84. [webapps] DUWare Multiple Products - Multiple Vulnerabilities
  85. [papers] [Kernel Exploitation] 5: Integer Overflow
  86. [papers] [Kernel Exploitation] 4: Stack Buffer Overflow (SMEP Bypass)
  87. [papers] [Kernel Exploitation] 3: Stack Buffer Overflow (Windows 7 x86/x64)
  88. [papers] [Kernel Exploitation] 2: Payloads
  89. [papers] [Kernel Exploitation] 1: Setting up the environment
  90. [dos] macOS 10.13 (17A365) - Kernel Memory Disclosure due to Lack of Bounds Checking
  91. [shellcode] Linux/ARM - Reverse TCP (192.168.1.1:4444/TCP) Shell (/bin/sh) + Password
  92. [webapps] GitStack 2.3.10 - Unauthenticated Remote Code Execution
  93. [dos] Smiths Medical Medfusion 4000 - 'DHCP' Denial of Service
  94. [local] glibc - 'getcwd()' Local Privilege Escalation
  95. [shellcode] Windows/x86 (XP SP3) - MessageBox Shellcode (11 bytes)
  96. [shellcode] Windows/x86 (XP SP3) (English) - calc Shellcode (16 bytes)
  97. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (42 bytes)
  98. [shellcode] Windows/x86 (XP SP3) (Turkish) - cmd.exe Shellcode (52 bytes)
  99. [shellcode] Windows/x86 (XP SP3) (Turkish) - calc.exe Shellcode (53 bytes)
  100. [shellcode] Windows/x86 (XP SP3) (Turkish) - MessageBoxA Shellcode (109 bytes)
  101. [shellcode] Windows/x86 - Message Box + Null-Free Shellcode (140 bytes)
  102. [shellcode] Windows/x86 - calc.exe + Null-Free Shellcode (100 bytes)
  103. [shellcode] Windows/x86 - Download File (http://skypher.com/dll) + LoadLibrary + Null
  104. [shellcode] Windows/x86 (XP Professional SP3) (French) - calc.exe Shellcode (31 bytes
  105. [shellcode] Windows/x86 (XP Professional SP2) - calc Shellcode (57 bytes)
  106. [shellcode] Windows/x86 (XP Professional SP2) (English) - Wordpad Shellcode (15 bytes
  107. [shellcode] Windows/x86 (XP SP3) (French) - Sleep 90 Seconds Shellcode (14 bytes)
  108. [shellcode] Windows/x86 - Create Admin User (X) Shellcode (304 bytes)
  109. [shellcode] Windows/x86 (2000) - Reverse TCP (192.168.0.247:8721/TCP) Connect + Vampi
  110. [shellcode] Windows/x86 (NT/XP/2000/2003) - Bind TCP (8721/TCP) Shell Shellcode (356
  111. [shellcode] Linux/x86 - ROT-7 Encodor + Decoder execve Shellcode (74 bytes)
  112. [shellcode] Linux/x86 - setreuid() + execve(/usr/bin/python) Shellcode (54 bytes)
  113. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:1337/TCP) Shell Shellcode (74 bytes)
  114. [shellcode] Linux/x86 - Bind TCP (1337/TCP) Shell Shellcode (89 bytes)
  115. [shellcode] Linux/x86 - shutdown -h now Shellcode (56 bytes)
  116. [shellcode] Linux/x86 - chmod 0777 /etc/shadow + Obfuscated Shellcode (51 bytes)
  117. [shellcode] Linux/x86 - JMP-FSTENV execve Shellcode (67 bytes)
  118. [shellcode] Linux/x86 - shift-bit execve Encoder Shellcode (114 bytes)
  119. [shellcode] Linux/x86 - Copy /etc/passwd to /tmp/outfile Shellcode (97 bytes)
  120. [shellcode] Linux/x86 - execve(/bin/sh) Using jump/call/pop Shellcode (52 bytes)
  121. [shellcode] Linux/x86 - Download (http://192.168.2.222/x) + chmod() + execute Shellco
  122. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:12345/TCP) cat /etc/passwd Shellcode (
  123. [shellcode] Linux/x86 - Bind TCP Shell Shellcode (112 bytes)
  124. [shellcode] Linux/x86 - execve(/bin/sh) + Obfuscated Shellcode (30 bytes)
  125. [shellcode] Linux/x86 - Egghunter (0x5090) Shellcode (38 bytes)
  126. [shellcode] Linux/x86 - /proc/sys/net/ipv4/ip_forward 0 + exit() Shellcode (83 bytes)
  127. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell Shellcode (108 bytes)
  128. [shellcode] Linux/x86 - Uzumaki Encryptor Shellcode (Generator)
  129. [shellcode] Linux/x86 - execve(/bin/shUzumaki) + Uzumaki Encoded + Null-Free Shellcod
  130. [shellcode] Linux/x86 - execve wget + Mutated + Null-Free Shellcode (96 bytes)
  131. [shellcode] Linux/x86 - Fork Bomb + Mutated + Null-Free Shellcode (15 bytes)
  132. [shellcode] Linux/x86 - Reboot + Mutated + Null-Free Shellcode (55 bytes)
  133. [shellcode] Linux/x86 - Read /etc/passwd file + Null-Free Shellcode (51 bytes)
  134. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (6)
  135. [shellcode] Linux/x86 - Insertion Decoder Shellcode (33+ bytes)
  136. [webapps] Primefaces 5.x - Remote Code Execution (Metasploit)
  137. [shellcode] Linux/x86 - Egg Hunter Shellcode (38 bytes)
  138. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (57 bytes)
  139. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell Shellcode (73 bytes)
  140. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + GetPC/Call/Ret Method Shellcode (
  141. [shellcode] Linux/x86 - Bind TCP (Random TCP Port) Shell Shellcode (65 bytes)
  142. [shellcode] Linux/x86 - Reverse TCP (127.1.1.1:55555/TCP) Shell Shellcode (72 bytes)
  143. [shellcode] Linux/x86 - Bind TCP (1111/TCP) Shell + SO_REUSEADDR Set (Avoiding SIGSEG
  144. [shellcode] Linux/x86 - Force Reboot Shellcode (36 bytes)
  145. [shellcode] Linux/x86 - execve(chmod 0777 /etc/shadow) Shellcode (57 bytes)
  146. [dos] Microsoft Edge Chakra JIT - Stack-to-Heap Copy
  147. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (23 bytes) (2)
  148. [shellcode] Linux/x86 - iptables --flush Shellcode (43 bytes)
  149. [dos] Microsoft Edge Chakra - 'AsmJSByteCodeGenerator::EmitCall' Out-of-Bounds Read
  150. [shellcode] Linux/x86 - Stager Reads Second Stage From STDIN Shellcode (14 bytes)
  151. [dos] Microsoft Edge Chakra JIT - Out-of-Bounds Write
  152. [dos] Microsoft Edge Chakra - Deferred Parsing Makes Wrong Scopes (2)
  153. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (28 bytes)
  154. [dos] Microsoft Edge Chakra - Incorrect Scope Handling
  155. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/zsh", [/bin/zsh, NULL]) + XOR En
  156. [dos] Microsoft Edge Chakra - 'JavascriptGeneratorFunction::GetPropertyBuiltIns' Type
  157. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/ksh", [/bin/ksh, NULL]) + XOR En
  158. [shellcode] Linux/x86 - setreuid(0,0) + execve("/bin/csh", [/bin/csh, NULL]) + XOR En
  159. [dos] Microsoft Edge Chakra JIT - Incorrect Bounds Calculation
  160. [shellcode] Linux/x86 - setreuid(0,0) + execve(/bin/ash,NULL,NULL) + XOR Encoded Shel
  161. [shellcode] Linux/x86 - setreuid() + /sbin/iptables -F + exit(0) Shellcode (76 bytes)
  162. [shellcode] Linux/x86 - mkdir(hacked) + exit() Shellcode (36 bytes)
  163. [shellcode] Linux/x86 - /etc/init.d/apparmor teardown Shellcode (53 bytes)
  164. [shellcode] Linux/x86 - execve(/bin/cat, /etc/shadow, NULL) Shellcode (42 bytes)
  165. [shellcode] Linux/x86 - execve(/bin/dash) Shellcode (49 bytes)
  166. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (5)
  167. [shellcode] Linux/x86 - execve(/bin/sh) Shellcode (21 bytes) (3)
  168. [shellcode] Linux/x86 - /usr/bin/killall snort Shellcode (46 bytes)
  169. [shellcode] Linux/x86 - /sbin/iptables -POUTPUT DROP Shellcode (60 bytes)
  170. [shellcode] Linux/x86 - Bind TCP (31337/TCP) Shell + Polymorphic Shellcode (125 bytes
  171. [shellcode] Linux/x86 - CDRom Ejecting + Polymorphic Shellcode (74 bytes)
  172. [shellcode] Linux/x86 - chmod(/etc/shadow, 0666) + ASCII Shellcode (443 bytes)
  173. [shellcode] Linux/x86 - Force unmount /media/disk Shellcode (33 bytes)
  174. [shellcode] Linux/x86 - execve(/bin/sh) + Polymorphic Shellcode (26 bytes)
  175. [remote] Master IP CAM 01 - Multiple Vulnerabilities
  176. [shellcode] Linux/x86 - sys_setdomainname("th1s s3rv3r h4s b33n h1j4ck3d !!") Shellco
  177. [shellcode] Linux/x86 - sys_rmdir("/tmp/willdeleted") Shellcode (41 bytes)
  178. [shellcode] Linux/x86 - sys_execve(/bin/sh, -c, ping localhost) Shellcode (55 bytes)
  179. [shellcode] Linux/x86 - sys_sync Shellcode (6 bytes)
  180. [shellcode] Linux/x86 - sys_exit(0) Shellcode (8 bytes)
  181. [shellcode] Linux/x86 - sys_sethostname(PwNeD !!, 8) Shellcode (32 bytes)
  182. [shellcode] Linux/x86 - CDRom Ejecting Shellcode (46 bytes)
  183. [shellcode] Linux/x86 - Remote File Download Shellcode (42 bytes)
  184. [shellcode] Linux/x86 - pwrite(/etc/shadow, (md5 hash of agix), 32, 8) Shellcode (89
  185. [webapps] SugarCRM 3.5.1 - Cross-Site Scripting
  186. [webapps] Belkin N600DB Wireless Router - Multiple Vulnerabilities
  187. [shellcode] Linux/x86 - setuid(0) + chmod(/etc/shadow, 0666) Shellcode (37 bytes)
  188. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh, 0, 0) Shellcode (27 bytes)
  189. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (29 bytes)
  190. [webapps] D-Link DSL-2640R - Unauthenticated DNS Change
  191. [shellcode] Linux/x86 - /sbin/iptables --flush Shellcode (69 bytes)
  192. [webapps] Reservo Image Hosting Script 1.5 - Cross-Site Scripting
  193. [shellcode] Linux/x86 - Bind TCP (45295/TCP) Shell (/bin/sh) + fork() Shellcode (131
  194. [shellcode] Linux/x86 - Reverse TCP (www.netric.org:45295/TCP) Shell (/bin/sh) Shellc
  195. [shellcode] Linux/x86 - setresuid(0,0,0) + execve(/bin/sh) + exit() Shellcode (41 byt
  196. [shellcode] Linux/x86 - socket-proxy Shellcode (372 bytes) (Generator)
  197. [shellcode] Linux/x86 - chmod(/bin/sh,04775) + set sh +s Shellcode (31 bytes)
  198. [shellcode] Linux/x86 - setuid() + execve() + exit() Shellcode (44 bytes)
  199. [shellcode] Linux/x86 - Add Root User To /etc/passwd + No Password + exit() Shellcode
  200. [shellcode] Linux/x86 - execve(/bin/ash) + exit Shellcode (34 bytes)
  201. [webapps] Zomato Clone Script - Arbitrary File Upload
  202. [shellcode] Linux/x86 - execve(/bin/sh /tmp/p00p) Shellcode (70 bytes)
  203. [remote] Transmission - RPC DNS Rebinding
  204. [shellcode] Linux/x86 - execve(/sbin/iptables -F) Shellcode (70 bytes)
  205. [shellcode] Linux/x86 - execve(/sbin/ipchains -F) Shellcode (70 bytes)
  206. [shellcode] Linux/x86 - Add Root User (w000t) + No Password Shellcode (177 bytes)
  207. [shellcode] Linux/x86 - fork() + setreuid(0, 0) + execve(cp /bin/sh /tmp/sh; chmod 47
  208. [remote] Seagate Personal Cloud - Multiple Vulnerabilities
  209. [shellcode] Linux/x86 - Audio (knock knock knock) via /dev/dsp + setreuid(0,0) + exec
  210. [shellcode] Linux/x86 - execve(/bin/sh,0,0) Shellcode (21 bytes)
  211. [shellcode] Linux/x86 - setuid(0) + execve("/bin/sh",0,0) Shellcode (28 bytes)
  212. [shellcode] Linux/x86 - Bind TCP (64713/TCP) Shell (/bin/sh) Shellcode (83 bytes)
  213. [shellcode] Linux/x86 - execve(/sbin/halt,/sbin/halt) Shellcode (27 bytes)
  214. [shellcode] Linux/x86 - execve(/sbin/reboot,/sbin/reboot) Shellcode (28 bytes)
  215. [shellcode] Linux/x86 - execve(/sbin/shutdown,/sbin/shutdown 0) Shellcode (36 bytes)
  216. [shellcode] Linux/x86 - setuid(0) + setgid(0) + execve(/bin/sh,[/bin/sh,NULL])) Shell
  217. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh,0) Shellcode (25 bytes)
  218. [shellcode] Linux/x86 - exit(0) / exit(1) Shellcode (3/4 bytes)
  219. [shellcode] Linux/x86 - setuid(0) + execve(/bin/sh) Shellcode (27 bytes)
  220. [shellcode] Linux/x86 - Disable Shadowing Shellcode (42 bytes)
  221. [shellcode] Linux/x86 - Add Root User (w00w00) To /etc/passwd Shellcode (104 bytes)
  222. [shellcode] Linux/x86 - Bind TCP (3879/TCP) Shell (/bin/sh) Shellcode (113 bytes)
  223. [shellcode] BSD/x86 - execve(/bin/sh) Shellcode (28 bytes)
  224. [shellcode] BSD/x86 - execve(/bin/sh) + seteuid(0) Shellcode (31 bytes)
  225. [shellcode] Linux/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes
  226. [shellcode] BSD/x86 - Write to /etc/passwd with uid(0) + gid(0) Shellcode (74 bytes)
  227. [shellcode] Linux/x86 - symlink /bin/sh sh Shellcode (36 bytes)
  228. [shellcode] BSD/x86 - symlink /bin/sh sh Shellcode (39 bytes)
  229. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) Shellcode (58 bytes)
  230. [shellcode] Linux/x86 - Flush IPChains Rules (/sbin/ipchains -F) + exit() Shellcode (
  231. [shellcode] Linux/x86 - Flush IPTables Rules (/sbin/iptables -F) + exit() Shellcode (
  232. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (40 bytes)
  233. [shellcode] BSD/x86 - Break chroot (../ 10x Loop) Shellcode (28 bytes)
  234. [shellcode] OpenBSD/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (74 byt
  235. [shellcode] OpenBSD/x86 - Load Kernel Module (/tmp/o.o) Shellcode (66 bytes)
  236. [shellcode] BSD/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  237. [shellcode] Linux/x86 - setuid(0) + Break chroot (../ 10x Loop) Shellcode (34 bytes)
  238. [shellcode] Linux/x86 - setuid(0) + Load Kernel Module (/tmp/o.o) Shellcode (67 bytes
  239. [shellcode] BSD - Bind TCP (2222/TCP) Shell Shellcode (100 bytes)
  240. [shellcode] BSD - setuid(0) + chroot() + Bind TCP (2222/TCP) Shell Shellcode (133 byt
  241. [shellcode] BSD - setuid(0) + chroot() + execute /bin/sh Shellcode (57 bytes)
  242. [shellcode] Linux/x86 - Add User (t00r/t00r) PexFnstenvSub Encoded Shellcode (116 byt
  243. [shellcode] Solaris/x86 - execve(/bin/sh) Shellcode (43 bytes)
  244. [shellcode] Solaris/x86 - setuid(0) + /bin/cat /etc/shadow Shellcode (61 bytes)
  245. [shellcode] Solaris/SPARC - Bind TCP Shell Shellcode
  246. [shellcode] Solaris/SPARC - Bind TCP (2001/TCP) Shell (/bin/sh) Shellcode
  247. [shellcode] Solaris/SPARC - setreuid(geteuid()) + setregid(getegid()) + execve(/bin/s
  248. [shellcode] Solaris/MIPS - Download (http://10.1.1.2:80/evil-dl) + Execute (/tmp/ff)
  249. [shellcode] Solaris/MIPS - Reverse TCP (10.0.0.3:44434/TCP) Shell + XNOR Encoded Traf
  250. [shellcode] OSX/x86 - execve(/bin/sh) Shellcode (24 bytes)