This is a polymorphic shellcode generator for ARM architecture that produces execve("/bin/sh", ["/bin/sh"], NULL).
de860077ea38ffa4a008b24122c4949fb3e19f8ebbc539c89d975eae3bc82105
78 bytes small polymorphic execve("/bin/sh", ["/bin/sh"], NULL); - XOR 88 encoded shellcode.
59e3979481a38f547de4a781bdb6aa800fb9a71fc50a3d868cd18cd9c6d62e2f
102 bytes small disable ASLR security Linux / ARM shellcode.
520d236fa1dfb1562d34c69e8d596039453ef6a1a483848217601172fa478804
28 bytes small setuid(0) and kill(-1, SIGKILL) Linux / ARM shellcode.
4bad1d0b679d87172dcc6f02fb16b79316d8719d6008dd9f4cf6b949a4423cc8
38 bytes small setuid(0) and execve("/bin/sh","/bin/sh",0) Linux / ARM shellcode.
7518787117780d501fe3384e13c5100c61a274b83ba5712d5a476c7c0f2a03f0
30 bytes small execve("/bin/sh","/bin/sh",0) Linux / ARM shellcode.
3c55755f5cb660d835a75d993b2505c44c91cb971feb024e35cc4afdcca108dc
390 bytes small add root user with password Linux / x86-64 shellcode.
d28fbed14b3fe70ed94af8984ebf17f14d603534eddc8b6138e4a6889a6e0f10
70 bytes small disable ASLR security Linux / x86 shellcode.
e73667fa779abc7d845fc6fa3ae4fb49787260154518630cc9d3b1f10d2e1d46
63 bytes small setuid(0) and chmod ("/etc/passwd", 0777) and exit(0) Linux / x86-64 shellcode.
3e41f28b1e74da9daeecb4f8307a8229d304b655f08b9f818258fbfc0b593249
51 bytes small setuid(0) and reboot Linux / x86-64 shellcode.
1602d03f14b343e82fcfe012cb8800f8ea9321a5a783a20ae0f412b06b3545b0
This tool is a polymorphic shellcode editor.
80e7547fd684fb6a3e2aacc65fbc85005ed50a4d36805f404985dafe4ebfec7b
48 bytes small sync() and reboot() and exit(0) Solaris / x86 shellcode.
76856ffb4dd467201e8a6f8120d47007a8b706b4fedd091602534c770d126311
39 bytes small Solaris / x86 System-V killall command shellcode.
4cd6049a4a3017fb6f91c14fe3f6708294aa747f1774b2e8e88ebcd7f06afbae
106 bytes small Linux/x86 disable randomize stack address shellcode.
35d8630bd9123b26df4c95ebc2cc73d88c99017d32b061a3890cd84779c2f483
79 bytes small Solaris / x86 remote download file shellcode.
baf9171bb2d5a9bc4583a277d034b41d4e3d7397d5fe235639fb3f2f73f428dd
37 bytes small Solaris / x86 Reboot() shellcode.
3af960b26fb6432f4e64abbf3868167fcf49c04a75ff8d1f882932d74ee5fee7
36 bytes small halt shellcode for Solaris/x86.
d5d6fd10681025e774acb6a47fdef2f21bd6b7ef2f94390eb37de881d98f7e97
27 bytes small Solaris/x86 execve("/bin/sh","/bin/sh",NULL) shellcode.
6fbd240b11e7e8c184ffc762b3948733357250ef2f698105716ad6e7c52e0e08
42 bytes small Linux/x86 execve("/usr/bin/wget","aaaa"); shellcode.
4f28ade719844d3175c926a102509862dcf892f296efb022e1caddea183500d6
57 bytes small Linux/x86 polymorphic execve("/bin/bash","-p",NULL) shellcode.
f6c91d051514db6380bc499891959089cd1c984168b0ad58d45668db6a3156cd
33 bytes small Linux/x86 execve("/bin/bash","-p",NULL) shellcode.
cfaa5b5b6456a7736b0887b9dcfe7b971a523d979d04def460f60fdf878fd352
6 bytes small Linux x86 forkbomb shellcode.
af57feb831959afec0d673005e917436098771731c9d9b3f67fc797e6a4d3a99
30 bytes small Linux x86 polymorphic forkbomb shellcode.
ecd6234bbd01057c8053558902bdc1590315634eb2255d8d4af2a81a1bf798e6
6 bytes small Linux/x86 fork() shellcode.
b8a211d7d9feeb591b92636544683ccac0866e04bc0aec93ad58bbfb95f42377
CompleteFTP version 3.3.0 remote memory consumption denial of service exploit.
92748ce1bda4e19d5c8f2238a5acb7305da6442aa3e1bf533bb393794067af50