example_1.c |
This is a Linux/i386 ShellCode that writes "I'm Here!!!" to stout. |
example_2.c |
This is a BSD/i386 ShellCode that exec a setuid(0), then writes "Someone was here !!!" to /root/readme. |
example_3.c |
This is a Linux/i386 ShellCode that exec a setuid(0), then writes "I'm looking you..." to /dev/tty. |
example_4.c |
This is a BSD/i386 polymorphic ShellCode that exec a setuid(0) and a setgid(0), then executes /bin/sh and exit(0). |
example_5.c |
This is a Linux/i386 polymorphic ShellCode that exec a setuid(0), then evade from chroot and executes /usr/X11R6/bin/xterm -display 192.168.1.50:0.0 and exit(0). |
example_6.c |
This is a Linux/i386 ShellCode that exec a setuid(0) and a setgid(0), then listens to the port 12345 and when receves a connection fork()s. The child first evade from chroot then executes /bin/sh and exit(0). The father listens for the next connection. |
example_7.c |
This is a Linux/i386 ShellCode that exec a setuid(0), then listens to the port 54321 and when receves a connection first evade from chroot then executes /bin/cat /etc/passwd /etc/shadow and exit(0). |
example_8.c |
This is a Linux/i386 polymorphic ShellCode that opens a connection to 192.168.1.50:8000 and exec a setuid(0) and a setgid(0), then evade from chroot and executes /bin/sh and exit(0). |
example_9.c |
This is a Linux/i386 polymorphic ShellCode that opens a connection to 192.168.1.50:9000 and exec a setuid(0), then evade from chroot and executes /bin/grep root /etc/shadow and exit(0). |
example_10.c |
This is a Linux/i386 polymorphic ShellCode that reuse the opened connection from 192.168.1.50:80 and exec a setuid(0) and a setgid(0), then evade from chroot and executes /bin/sh and exit(0). |