66 bytes small Linux/x86 Execve() alphanumeric shellcode.
c80b7af5e1f064c621aae312298ea6dfd091d45a1194f818ea0fae53012fca9d
74 bytes small add user User to /etc/passwd shellcode.
3f2771c906ec4704d9721c76ce05ec176438b7108d68118ba748721929fafd19
25 bytes small Linux/x86 execve /bin/sh shellcode.
6ec3a762f49cf073c4aaf48e89626df8b0be9238e36987f32f78d2e3bcc88c5d
91 bytes small Linux/x86 reverse shell NULL free 127.0.0.1:4444 shellcode.
e41394ff0ce73676c56d6dc657e2f1f811e92852a6ff50e91919a685056dc893
132 bytes small Linux/x86 NOT + XOR-N + random encoded /bin/sh shellcode.
0b23de6ec5c6e6b408103df4a217ec69f9bdb8b72445a298282426667895f102
xorg-x11-server versions prior to 1.20.1 local privilege escalation exploit.
fb77fab828d8d0bab406044be7355eb91d3ce8026b117ae80f463ff6657192d5