Exploit the possiblities
Showing 1 - 25 of 772 RSS Feed

x86 Files

Linux/x86-64 IPTables Flush Shellcode
Posted Jan 12, 2018
Authored by 0x4ndr3

43 bytes small Linux/x86-64 execve("/sbin/iptables", ["/sbin/iptables", "-F"], NULL) shellcode.

tags | x86, shellcode
systems | linux
MD5 | b6402eb0799fd8fe40b5aff352f7747a
Linux/x86-64 Add Mapping In /etc/hosts Shellcode
Posted Jan 12, 2018
Authored by 0x4ndr3

96 bytes small Linux/x86-64 add mapping (127.1.1.1 google.lk) in /etc/hosts shellcode.

tags | x86, shellcode
systems | linux
MD5 | 58571c81a05ae0a8e172b90ba5bfe997
Linux/x86-64 /bin/sh Shellcode
Posted Jan 12, 2018
Authored by 0x4ndr3

24 bytes small Linux/x86-64 execute /bin/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | 50f820da8824e476bf8fe8000f27344b
Linux/x86 execve(/bin/sh) Polymorphic Shellcode
Posted Jan 11, 2018
Authored by Debashis Pal

53 bytes small Linux/x86 execve(/bin/sh) polymorphic shellcode.

tags | x86, shellcode
systems | linux
MD5 | 8969e8597aaffe29988a671c18982769
Linux x86 exec /bin/dash Shellcode
Posted Jan 9, 2018
Authored by Hashim Jawad

30 bytes small Linux x86 exec /bin/dash shellcode.

tags | x86, shellcode
systems | linux
MD5 | e73a8aae13cbff1019f6a54b3efdd89f
Linux x86 Reverse Shell Shellcode
Posted Jan 6, 2018
Authored by Nipun Jaswal, Nipun Jaswal (@nipunjaswal) ; SLAE-1080

69 bytes small Linux x86 reverse TCP /bin/sh shell null-free shellcode that connects to 127.1.1.1:8888.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 6d533f25a7d4621fb39f38d138aedb06
Linux x86 chmod 777 /etc/sudoers Shellcode
Posted Jan 6, 2018
Authored by Hashim Jawad

36 bytes small Linux x86 chmod 777 /etc/sudoers shellcode.

tags | x86, shellcode
systems | linux
MD5 | ca0f278a45ecc842e202e2b69af7095c
SyncBreeze 10.1.16 SEH GET Overflow
Posted Oct 13, 2017
Authored by wetw0rk | Site metasploit.com

There exists an unauthenticated SEH based vulnerability in the HTTP server of Sync Breeze Enterprise version 10.1.16, when sending a GET request with an excessive length it is possible for a malicious user to overwrite the SEH record and execute a payload that would run under the Windows NT AUTHORITY\SYSTEM account. The SEH record is overwritten with a "POP,POP,RET" pointer from the application library libspp.dll. This exploit has been successfully tested on Windows XP, 7 and 10 (x86->x64). It should work against all versions of Windows and service packs.

tags | exploit, web, x86
systems | windows, nt, xp
MD5 | d7371f0084bb280d35baaca73d2c929d
Linux/x86 execve(/bin/sh) Polymorphic Shellcode
Posted Oct 13, 2017
Authored by Manuel Mancera

30 bytes small Linux/x86 polymorphic execve(/bin/sh) shellcode.

tags | x86, shellcode
systems | linux
MD5 | e6f636dfcfcc6d4796c8328badab84e1
Linux/x86-64 Reverse TCP Shell Shellcode
Posted Aug 21, 2017
Authored by Touhid M.Shaikh

153 bytes small Linux/x86-64 reverse TCP shell shellcode that binds to 192.168.1.2:4444.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 61d0bff1874dee43bdda29cd1ada3ad1
Demystifying Windows Kernel Exploitation By Abusing GDI Objects
Posted Aug 8, 2017
Site sensepost.com

Demystifying Windows Kernel Exploitation by Abusing GDI Objects. This has the Windows 7 SP1 x86 exploit demonstrated at Defcon 25.

tags | exploit, x86, kernel
systems | windows, 7
MD5 | 52d4377ede9d242df50d7a38f59a4d4d
Linux x86 TCP Reverse Shell
Posted Jul 27, 2017
Authored by wetw0rk

97 bytes small Linux/x86 reverse tcp shell shellcode with no NULLs.

tags | shell, x86, tcp, shellcode
systems | linux
MD5 | 2eae0af7fba90fcf388c03ecca6c1eef
Microsoft Windows 7 SP1 x86 GDI Palette Objects Local Privilege Escalation
Posted Jul 19, 2017
Authored by Saif

Microsoft Windows 7 SP1 x86 GDI palette objects local privilege escalation exploit that leverages the vulnerability as described in MS17-017.

tags | exploit, x86, local
systems | windows, 7
MD5 | ab4d0df9332bcf2c1c566cf56cc2b9ab
Linux/x86 Reverse TCP Shellcode
Posted Jul 5, 2017
Authored by Geyslan G. Bem

67 bytes small Linux/x86 reverse TCP shellcode.

tags | x86, tcp, shellcode
systems | linux
MD5 | 842638c13eb52e710504c2fbb9b1236a
Linux/x86 Bind Shell Shellcode
Posted Jun 26, 2017
Authored by wetw0rk

75 bytes small Linux/x86 shellcode that binds a shell to port 4444. Contains no NULLs.

tags | shell, x86, shellcode
systems | linux
MD5 | 501256220065b8b18c393c129a24f35f
Microsoft MsMpEng VFS API Heap Corruption
Posted Jun 24, 2017
Authored by Tavis Ormandy, Google Security Research

The Microsoft MsMpEng mpengine x86 emulator suffers from a heap corruption vulnerability in VFS API.

tags | exploit, x86
MD5 | ad6ec64ce4f80c869242f035e8688c22
Linux/x86 XOR Encoded execve(/bin/sh) setuid(0) setgid(0) Shellcode
Posted Jun 15, 2017
Authored by nullparasite

66 bytes small Linux/x86 XOR encoded execve(/bin/sh) setuid(0) setgid(0) shellcode.

tags | x86, shellcode
systems | linux
MD5 | d1d73363a3b74b1aa86e532dd5cd3585
Linux/x86-64 JMP CALL POP /bin/sh Shellcode
Posted Jun 5, 2017
Authored by Touhid M.Shaikh

31 bytes small Linux/x86-64 JMP CALL POP /bin/sh shellcode.

tags | x86, shellcode
systems | linux
MD5 | a9a3ed56afabe12cf2913b23ab4e9198
BIND 9.10.5 Unquoted Service Path Privilege Escalation
Posted Jun 5, 2017
Authored by hyp3rlinx | Site hyp3rlinx.altervista.org

BIND version 9.10.5 for x86 and x64 on Windows suffers from an unquoted service path vulnerability that can allow for privilege escalation.

tags | exploit, x86
systems | windows
advisories | CVE-2017-3141
MD5 | b39267a55a45b5a08939bd042eb975f7
VX Search Enterprise GET Buffer Overflow
Posted May 23, 2017
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of VX Search Enterprise v9.5.12, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, web, overflow, x86
systems | windows, 7
MD5 | d253f613c50ab1d748ea4f581c269908
Sync Breeze Enterprise GET Buffer Overflow
Posted May 20, 2017
Authored by Daniel Teixeira | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of Sync Breeze Enterprise v9.4.28, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, web, overflow, x86
systems | windows, 7
MD5 | f3556ba8acc91d809655f9aaf8017697
Dup Scout Enterprise 9.5.14 Buffer Overflow
Posted May 17, 2017
Authored by Daniel Teixeira, vportal | Site metasploit.com

This Metasploit module exploits a stack-based buffer overflow vulnerability in the web interface of Dup Scout Enterprise v9.5.14, caused by improper bounds checking of the request path in HTTP GET requests sent to the built-in web server. This Metasploit module has been tested successfully on Windows 7 SP1 x86.

tags | exploit, web, overflow, x86
systems | windows, 7
MD5 | 56aad3822c1d8c83c5c90f04a016891e
Xen 64bit PV Guest Breakout Via Pagetable Use-After-Type-Change
Posted May 8, 2017
Authored by Jann Horn, Google Security Research

This is a bug in Xen that permits an attacker with control over the kernel of a 64bit X86 PV guest to write arbitrary entries into a live top-level pagetable.

tags | exploit, arbitrary, x86, kernel
MD5 | 5a144654a1b03c1ef898b305457a091d
Linux/x86-64 Reverse Shell Shellcode
Posted May 8, 2017
Authored by Srakai

113 bytes small Linux/x86-64 reverse shell shellcode for IPv6.

tags | shell, x86, shellcode
systems | linux
MD5 | ac5201873bbc6a9ce91386d7e9e153d6
Linux/x86 Disable ASLR Shellcode
Posted May 8, 2017
Authored by abatchy17

80 bytes small Linux/x86 disable ASLR shellcode.

tags | x86, shellcode
systems | linux
MD5 | 4e2115dbb3d9dd41fbb9cd0bccfd4b09
Page 1 of 31
Back12345Next

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

January 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Jan 1st
    2 Files
  • 2
    Jan 2nd
    13 Files
  • 3
    Jan 3rd
    16 Files
  • 4
    Jan 4th
    39 Files
  • 5
    Jan 5th
    26 Files
  • 6
    Jan 6th
    40 Files
  • 7
    Jan 7th
    2 Files
  • 8
    Jan 8th
    16 Files
  • 9
    Jan 9th
    25 Files
  • 10
    Jan 10th
    28 Files
  • 11
    Jan 11th
    44 Files
  • 12
    Jan 12th
    32 Files
  • 13
    Jan 13th
    2 Files
  • 14
    Jan 14th
    4 Files
  • 15
    Jan 15th
    31 Files
  • 16
    Jan 16th
    15 Files
  • 17
    Jan 17th
    16 Files
  • 18
    Jan 18th
    24 Files
  • 19
    Jan 19th
    7 Files
  • 20
    Jan 20th
    0 Files
  • 21
    Jan 21st
    0 Files
  • 22
    Jan 22nd
    0 Files
  • 23
    Jan 23rd
    0 Files
  • 24
    Jan 24th
    0 Files
  • 25
    Jan 25th
    0 Files
  • 26
    Jan 26th
    0 Files
  • 27
    Jan 27th
    0 Files
  • 28
    Jan 28th
    0 Files
  • 29
    Jan 29th
    0 Files
  • 30
    Jan 30th
    0 Files
  • 31
    Jan 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close