Varient 1.6.1 – SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/2XjWSpm
via IFTTT
Varient 1.6.1 – SQL Injection
from Exploit-DB.com RSS Feed https://ift.tt/2XjWSpm
via IFTTT
Linux/ARM64 – execve(“/bin/sh”, [“/bin/sh”], NULL) Shellcode (48 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2JwlilR
via IFTTT
Linux/ARM64 – Jump Back Shellcode + execve(“/bin/sh”, NULL, NULL) Shellcode (8 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2Xjw8VK
via IFTTT
Linux/ARM64 – mmap() + read() stager + execve(“/bin/sh”, NULL, NULL) Shellcode (60 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2JcbUTW
via IFTTT
Linux/ARM64 – Egghunter (PWN!PWN!) + execve(“/bin/sh”, NULL, NULL) + mprotect() Shellcode (88 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2Xjtsrj
via IFTTT
Linux/ARM64 – Read /etc/passwd Shellcode (120 Bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2JjAgLJ
via IFTTT
Linux/ARM64 – Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (140 bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2XighH4
via IFTTT
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2JjNisy
via IFTTT
Linux/ARM64 – Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (128 bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2XjtrUh
via IFTTT
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
from Exploit-DB.com RSS Feed https://ift.tt/2JhsthB
via IFTTT