Pinned Loading
-
Windows-x64-Processes-Injector
Windows-x64-Processes-Injector Public0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
-
CVE-2021-24155.rb
CVE-2021-24155.rb PublicWordPress Backup Guard Authenticated Remote Code Execution Exploit
-
Linux-x86-Reverse-Shell
Linux-x86-Reverse-Shell PublicLinux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
-
Linux-x86-Bind-Shellcode
Linux-x86-Bind-Shellcode PublicLinux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)
-
-
egghunter_shellcode
egghunter_shellcode PublicLinux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
Pinned Loading
-
Windows-x64-Processes-Injector
Windows-x64-Processes-Injector Public0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
-
CVE-2021-24155.rb
CVE-2021-24155.rb PublicWordPress Backup Guard Authenticated Remote Code Execution Exploit
-
Linux-x86-Reverse-Shell
Linux-x86-Reverse-Shell PublicLinux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
-
Linux-x86-Bind-Shellcode
Linux-x86-Bind-Shellcode PublicLinux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)
-
-
egghunter_shellcode
egghunter_shellcode PublicLinux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
Pinned Loading
-
Windows-x64-Processes-Injector
Windows-x64-Processes-Injector Public0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
-
CVE-2021-24155.rb
CVE-2021-24155.rb PublicWordPress Backup Guard Authenticated Remote Code Execution Exploit
-
Linux-x86-Reverse-Shell
Linux-x86-Reverse-Shell PublicLinux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
-
Linux-x86-Bind-Shellcode
Linux-x86-Bind-Shellcode PublicLinux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)
-
-
egghunter_shellcode
egghunter_shellcode PublicLinux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
If the problem persists, check the GitHub status page or contact support.