Menu
  • Run all tools without refreshing your page(Upcoming)

    Run all tools without refreshing your page(Upcoming)

Ip Is toxic Proxy Spam report
Scan options
Host Protocol Port State Service Version

Online pentesting tools freely offered online

Tools for System administrator and Network troubleshooting

Shell codes

Release Date Description Type Platform Author
2019-03-11 "Linux/x86 - Polymorphic execve(/bin/sh) Shellcode (63 bytes)" shellcode linux_x86 "Daniele Votta"
2019-03-11 "Linux/x86 - MMX-XOR Encoder / Decoder execve(/bin/sh) Shellcode (44 bytes)" shellcode linux_x86 "Daniele Votta"
2019-03-08 "Linux/x86 - INSERTION Encoder / Decoder execve(/bin/sh) Shellcode (88 bytes)" shellcode linux_x86 "Daniele Votta"
2019-03-05 "Linux/x86 - XOR Encoder / Decoder execve(/bin/sh) Shellcode (45 bytes)" shellcode linux_x86 "Daniele Votta"
2019-02-18 "macOS - execve(/bin/sh) + Null-Free Shellcode (31 bytes)" shellcode macos "Ken Kitahara"
2019-02-18 "macOS - Bind (4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (123 bytes)" shellcode macos "Ken Kitahara"
2019-02-18 "macOS - Reverse (127.0.0.1:4444/TCP) Shell (/bin/sh) + Null-Free Shellcode (103 bytes)" shellcode macos "Ken Kitahara"
2019-02-18 "macOS - Bind (4444/TCP) Shell (/bin/sh) + IPv6 Shellcode (129 bytes)" shellcode macos "Ken Kitahara"
2019-02-18 "macOS - Reverse (::1:4444/TCP) Shell (/bin/sh) +IPv6 Shellcode (119 bytes)" shellcode macos "Ken Kitahara"
2019-03-04 "Linux/x86 - iptables -F Shellcode (43 bytes)" shellcode linux_x86 "Cameron Brown"
2019-03-04 "Linux/x64 - Kill All Processes Shellcode (11 bytes)" shellcode linux_x86-64 "Aron Mihaljevic"
2019-03-04 "Linux/x86 - NOT Encoder / Decoder - execve(/bin/sh) Shellcode (44 bytes)" shellcode linux_x86 "Daniele Votta"
2019-02-05 "Linux/x86 - Random Insertion Encoder and Decoder Shellcode (Generator)" shellcode linux_x86 "Aditya Chaudhary"
2019-02-01 "Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (3)" shellcode linux_x86 Kiewicz
2019-01-29 "Linux/x86 - execve(/bin/sh) + RShift-1 Encoded Shellcode (29 bytes)" shellcode linux_x86 "Joao Batista"
2019-01-28 "Linux/ARM - Bind TCP (0.0.0.0:4321) Shell (/bin/sh) + Null-Free Shellcode (84 bytes)" shellcode arm "Gokul Babu"
2019-01-30 "Windows/x86 - 'msiexec.exe' Download and Execute Shellcode (95 bytes)" shellcode windows_x86 "Kartik Durg"
2019-01-28 "Linux/ARM - Reverse TCP (192.168.1.124:4321) Shell (/bin/sh) Shellcode (64 bytes)" shellcode arm "Gokul Babu"
2019-01-28 "Linux/x86 - Read /etc/passwd Shellcode (58 Bytes) (2)" shellcode linux_x86 "Joao Batista"
2019-01-28 "Linux/x86 - exit(0) Shellcode (5 bytes)" shellcode linux_x86 "Daniele Votta"
2019-01-29 "Linux/x86 - execve() - Terminal Calculator (bc) Shellcode (53 bytes)" shellcode linux_x86 "Daniele Votta"
2019-01-15 "Linux/x86 - Bind (4444/TCP) Shell (/bin/sh) Shellcode (100 bytes)" shellcode linux_x86 "Joao Batista"
2019-01-11 "Windows/x86 - Download With TFTP And Execute Shellcode (51-60 bytes) (Generator)" shellcode generator "Semen Alexandrovich Lyhin"
2019-01-09 "Linux/x86 - wget chmod execute over execve /bin/sh -c Shellcode (119 bytes)" shellcode linux_x86 strider
2018-12-24 "Linux/x86 - Kill All Processes Shellcode (14 bytes)" shellcode linux strider
2018-12-19 "Linux/x64 - Disable ASLR Security Shellcode (93 Bytes)" shellcode linux_x86-64 "Kağan Çapar"
2018-12-11 "Linux/x86 - Bind (1337/TCP) Ncat (/usr/bin/ncat) Shell (/bin/bash) + Null-Free Shellcode (95 bytes)" shellcode linux_x86 T3jv1l
2018-12-04 "Linux/x64 - Reverse (0.0.0.0:1907/TCP) Shell Shellcode (119 Bytes)" shellcode linux_x86-64 "Kağan Çapar"
2018-12-04 "Linux/x86 - /usr/bin/head -n99 cat etc/passwd Shellcode (61 Bytes)" shellcode linux Nelis
2018-11-13 "Linux/x86 - Bind (99999/TCP) NetCat Traditional (/bin/nc) Shell (/bin/bash) Shellcode (58 bytes)" shellcode linux_x86 "Javier Tello"
Latest exploits

Get updated with the latest exploits, useful if you are a usual pentester

Release Date Title Type Platform Author
2019-04-22 "UliCMS 2019.2 / 2019.1 - Multiple Cross-Site Scripting" webapps php "Kağan EĞLENCE"
2019-04-22 "Msvod 10 - Cross-Site Request Forgery (Change User Information)" webapps php ax8
2019-04-22 "74CMS 5.0.1 - Cross-Site Request Forgery (Add New Admin User)" webapps php ax8
2019-04-22 "WordPress Plugin Contact Form Builder 1.0.67 - Cross-Site Request Forgery / Local File Inclusion" webapps php "Panagiotis Vagenas"
2019-04-22 "ManageEngine Applications Manager 14.0 - Authentication Bypass / Remote Command Execution (Metasploit)" remote multiple AkkuS
2019-04-22 "LabF nfsAxe 3.7 Ping Client - 'Host IP' Buffer Overflow (Direct Ret)" local windows "Dino Covotsos"
2019-04-22 "Google Chrome 73.0.3683.103 V8 JavaScript Engine - Out-of-Memory in Invalid Table Size Denial of Service (PoC)" dos multiple "Bogdan Kurinnoy"
2019-04-22 "QNAP myQNAPcloud Connect 1.3.4.0317 - 'Username/Password' Denial of Service" dos hardware "Dino Covotsos"
2019-04-22 "Ease Audio Converter 5.30 - '.mp4' Denial of Service (PoC)" dos windows Achilles
2019-04-19 "Oracle Business Intelligence / XML Publisher 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - XML External Entity Injection" webapps windows "Vahagn Vardanyan"
2019-04-19 "Oracle Business Intelligence 11.1.1.9.0 / 12.2.1.3.0 / 12.2.1.4.0 - Directory Traversal" webapps windows "Vahagn Vardanyan"
2019-04-19 "Atlassian Confluence Widget Connector Macro - Velocity Template Injection (Metasploit)" remote multiple Metasploit
2019-04-18 "ManageEngine Applications Manager 11.0 < 14.0 - SQL Injection / Remote Code Execution (Metasploit)" remote windows AkkuS
2019-04-19 "SystemTap 1.3 - MODPROBE_OPTIONS Privilege Escalation (Metasploit)" local linux Metasploit
2019-04-18 "LibreOffice < 6.0.7 / 6.1.3 - Macro Code Execution (Metasploit)" local multiple Metasploit
2019-04-18 "Evernote 7.9 - Code Execution via Path Traversal" local macos "Dhiraj Mishra"
2019-04-18 "Netwide Assembler (NASM) 2.14rc15 - NULL Pointer Dereference (PoC)" dos multiple "Fakhri Zulkifli"
2019-04-17 "MailCarrier 2.51 - POP3 'RETR' SEH Buffer Overflow" remote windows "Dino Covotsos"
2019-04-17 "Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in GlyphIterator::setCurrGlyphID" dos multiple "Google Security Research"
2019-04-17 "Oracle Java Runtime Environment - Heap Corruption During TTF font Rendering in sc_FindExtrema4" dos multiple "Google Security Research"
2019-04-17 "DHCP Server 2.5.2 - Denial of Service (PoC)" dos windows "Victor Mondragón"
2019-04-17 "ASUS HG100 - Denial of Service" dos hardware "YinT Wang"
2019-04-16 "Joomla Core 1.5.0 - 3.9.4 - Directory Traversal / Authenticated Arbitrary File Deletion" webapps php "Haboob Team"
2019-04-16 "Zyxel ZyWall 310 / ZyWall 110 / USG1900 / ATP500 / USG40 - Login Page Cross-Site Scripting" webapps hardware "Aaron Bishop"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV PostLuafvPostReadWrite SECTION_OBJECT_POINTERS Race Condition Privilege Escalation" local windows "Google Security Research"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cache Manager Poisoning Privilege Escalation" local windows "Google Security Research"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV NtSetCachedSigningLevel Device Guard Bypass" local windows "Google Security Research"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV LuafvCopyShortName Arbitrary Short Name Privilege Escalation" local windows "Google Security Research"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV Delayed Virtualization Cross Process Handle Duplication Privilege Escalation" local windows "Google Security Research"
2019-04-16 "Microsoft Windows 10 1809 - LUAFV Delayed Virtualization MAXIMUM_ACCESS DesiredAccess Privilege Escalation" local windows "Google Security Research"
Raccoon

Raccoon

Offensive Security Tool for Reconnaissance and Information Gathering

Offensive features

  • DNS details
  • DNS visual mapping using DNS dumpster
  • WHOIS information
  • TLS Data - supported ciphers
  • Port Scan
  • Subdomain enumeration
  • Web application data retrieval
  • Detects known WAFs

Help us improve give us your feed back

  • What feature do you want?
  • What should we improve one?
  • What tools is not working as expected?