Exploit Development and Cybersecurity Researcher
Pinned Loading
-
Windows-x64-Processes-Injector
Windows-x64-Processes-Injector Public0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
-
CVE-2021-24155.rb
CVE-2021-24155.rb PublicWordPress Backup Guard Authenticated Remote Code Execution Exploit
-
Linux-x86-Reverse-Shell
Linux-x86-Reverse-Shell PublicLinux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
-
Linux-x86-Bind-Shellcode
Linux-x86-Bind-Shellcode PublicLinux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)
-
-
egghunter_shellcode
egghunter_shellcode PublicLinux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
Something went wrong, please refresh the page to try again.
If the problem persists, check the GitHub status page or contact support.
If the problem persists, check the GitHub status page or contact support.