Exploit Development and Cybersecurity Researcher
Block or Report
Block or report 0dayNinja
Report abuse
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abusePinned
-
0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)
-
CVE-2021-24155.rb Public
WordPress Backup Guard Authenticated Remote Code Execution Exploit
-
Linux-x86-Reverse-Shell Public
Linux/x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
-
Linux-x86-Bind-Shellcode Public
Linux/x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)
-
-
egghunter_shellcode Public
Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcode
36 contributions in the last year
Less
More
