105 bytes small Linux/x86 bindshell shellcode that spawns on TCP/4444.
843af161ff8f5f667b5b1c61ca684aff38 bytes small Linux/x86 egghunter + access() shellcode.
387772621eb89201ab1a444b0f1cfc2f98 bytes small Linux/x86 TCP/5555 bindshell shellcode.
460b0890fcf26db29390427ea3c1ed44Debian Linux Security Advisory 4210-1 - This update provides mitigations for the Spectre v4 variant in x86-based micro processors. On Intel CPUs this requires updated microcode which is currently not released publicly (but your hardware vendor may have issued an update).
675d048788c90a65cc1c06cdbf93690fMicrosoft Internet Explorer 11 on Windows 7 x64/x86 suffers from a vbscript code execution vulnerability.
c941ea777ceb3b732ed96b734dc41486101 bytes small Linux/x86 reverse TCP shell shellcode that connects to 10.0.7.17:4444.
6eeac0567a3fef4c667bd7ed8a53c0af113 bytes small Linux/x86 IPv6 TCP bindshell on port 4444 shellcode.
0b9eb7ceb9c4c0a8506d11f903a814d168 bytes small Linux/x86 reverse TCP shell shellcode.
992c716611405f56f700612608127ead96 bytes small Linux/x86 reverse TCP shell shellcode that connects to 127.0.0.1:4444.
595d776824a93f7666b99a23897c290erldns is an open source lightweight DNS server for linux, netbsd, freebsd, and openbsd. Runs on x86 and x86_64 architectures.
5b3cb3b9e8efbdc698d6294abcbf309d62 bytes small Linux/x86 read /etc/passwd shellcode.
22d749d25bebf4705648c7f284a33b44113 bytes small Linux/x86 bindshell forking null-free shellcode for TCP/9443.
1d7c353245f7ee1d017285c4d7912ba927 bytes small Linux/x86 execve(/bin/sh) not encoded shellcode.
b1c067632d5b3649aa48336f5e076c6e44 bytes small Linux/x86 execve /bin/sh encoded shellcode using ROT-13 + RShift-2 + XOR.
66c9b228bfc5ac325b4db48c96248d5a74 bytes small Linux/x86 cp /bin/sh /tmp/sh; chmod +s /tmp/sh shellcode.
3ddc9eeb64e408e1b68c86ecbad5757733 bytes small Linux/x86 chmod 4755 /bin/dash shellcode.
50a49297db99235b957ac45501135b0f79 bytes small Linux/x86 shellcode that edits /etc/sudoers with NOPASSWD for ALL.
d58cc1f56f48649ddfaf83f56e222e0473 bytes small Linux x86 reverse TCP shellcode that binds to 127.1.1.1:5555.
9e96cce76f9491a2d09409a32e416c2692 bytes small Linux x86 tcp/1337 bindshell shellcode.
ff78686f2571f1c5269ce33e66a58c8511 bytes small Linux/x86 egghunter shellcode.
9b4b51dc63cca9b58c058946a03cf25f5 bytes small Linux/x86 exit(0) shellcode.
97f77e037e6ad851dd4cb58e15f3337218 bytes small Linux/x86 execve /bin/sh shellcode.
739370cc7f3f22c6cac85503319011b5MikroTik RouterOS versions prior to 6.38.4 (x86) Chimay Red stack clash remote code execution exploit.
fa75bb56a5777825b631d7238931d52bThis Metasploit module exploits a stack-based buffer overflow vulnerability in Disk Savvy Enterprise version 10.4.18, caused by improper bounds checking of the request sent to the built-in server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.
bfeae1744c34384854bd5326b5010471This Metasploit module exploits a stack-based buffer overflow vulnerability in the CloudMe Sync version 1.10.9 client application. This Metasploit module has been tested successfully on Windows 7 SP1 x86.
41dab942f2886640903e2e9e54f5e2e7