64-bit Linux/x86 unlink ecryptfs-mount-private shellcode.
e22b097c6a59dd086e61b12a964cf0f730b1d95faea87a232b2d28efa7e16e00
This tool executes some manually crafted and some ragg2-cc crafted payloads for x86_64bit mainly.
585866ff76145a70a74c4d3b8ce043c790460b074cb7cd88146bb1f11b4d6352
64-bit x86/Linux unlink /.autofsck shellcode.
26924b93bc1d8255556d82adcdeb916cc8235763a6ac5b9baa70c0e7f85ca520
67 bytes small write(1,"radare rocks!"); + exit() for SPARC 32-bit.
fe17f7764e31480de236e2520ddda2ab879035769e6717bf1cb4e3bad3dd86d9
21 bytes small chmod 777 / shellcode.
f084a88e9abaa409f286d6479e022b0cdd812c3a196ea7f9be00c6b654820eb5
39 bytes small Solaris 2.6 /bin/ksh shellcode.
0c8ac78648038cc3eb09f741c72e50436658e4b11c73d0ce771456f67425e3eb
32 bytes small x86 chmod("/usr/games",01777) shellcode.
dcd2ea6939ec21094a482aeb3569b9eea891292895fe38577dbeca3e40fb8e27
When using usb_modeswitch and invoking pppd from wvdial in -detach mode. a /tmp/debug file is created. A local Attacker could overwrite arbitrary files.
8d3c41b30627a514ca963158a099851a1cb31165bd228c27f1d9b76af12c9189