Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
>> TAG: #remote exploit
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (164 bytes)
Linux/ARM64 – Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (176 bytes)
Linux/ARM64 – Read /etc/passwd Shellcode (120 Bytes)
CyberPanel 1.8.4 – Cross-Site Request Forgery
FaceSentry Access Control System 6.4.8 – Remote Command Injection
FaceSentry Access Control System 6.4.8 – Cross-Site Request Forgery
FaceSentry Access Control System 6.4.8 – Remote Root Exploit
FaceSentry Access Control System 6.4.8 – Remote SSH Root
Linux/x86 – execve(/bin/sh) using JMP-CALL-POP Shellcode (21 bytes)
Linux/ARM64 – mmap() + read() stager + execve(“/bin/sh”, NULL, NULL) Shellcode (60 Bytes)