17 bytes small Linux/x86 execve(/bin/sh) shellcode.
1b7f8c231c50bdbd88ccc61b077281f8
21 bytes small Linux/x64 execve(/bin/sh) shellcode.
3eb904edf84797c8c3688bec6a97022e
240 bytes small Windows/x86 add user Alfred to administrators/remote desktop users group shellcode.
444c0277c03e6f66fefa718118a17499
66 bytes small Linux/x64 execve "cat /etc/shadow" shellcode.
12d3d60f176481a38c68ae9d5a668edb
142 bytes small Linux/x64 shellcode that binds a password protected shell to TCP 0.0.0.0:4444.
f8b947c4c7650a50507dafa334b79742
143 bytes small Windows/x86 stager generic MSHTA shellcode.
cd26783c34c055b8e7b1aa54b1801d75
113 bytes small Linux/x86 Socat bind shellcode.
bb6b9dc9e8fde4989a5257fab4161276
123 bytes small Linux/x64 reverse shell shellcode that connects to TCP/127.1.1.1:4444.
6fdcaaec184d84b16a741d95de7b3961
65 bytes small Linux/x86 bindshell shellcode that binds /bin/sh to TCP/0.0.0.0:13377.
b50ae92a79eb994d20eae879ab538a64
114 bytes small Linux/x86 reverse TCP shellcode.
736ab2fee6b1fc77956e403631161630
84 bytes small Linux/x86 reverse TCP shellcode.
d27c925e63f6be65e2fe56789bbf7646
10 bytes small Linux/x86 execve "/bin/sh" shellcode.
17eba74611ee88dd5e7b38ff76974d98
35 bytes small Linux/x86 /dev/sda wiping shellcode.
19e25cdfd1453bac178a73395ba04bfa
35 bytes small Linux/x86 Egghunter(0x50905090) + sigaction + execve(/bin/sh) shellcode.
f1b110ff59b4adb7c79737eb1fc046c4
100 bytes small Windows/x86 download using mshta.exe shellcode.
35ca25f1d948941abefae3daa165c025
100 bytes small null-free Linux/ARM shellcode that binds /bin/sh to 0.0.0.0:1337/TCP.
111a5d97d0327b4f3d4106f084eac97e
32 bytes small Linux/ARM execve /bin/dash shellcode.
abc2225ec6ad691079909d8f03eab5a9
102 bytes small Linux/x86 add map in /etc/hosts file polymorphic shellcode.
979a6e0e42c8f46c1647b1c2de0c533a
124 bytes small ASLR deactivation polymorphic shellcode.
68fed31edbc95b6538cd08d866de9910
75 bytes small Linux/x86 tiny read polymorphic shellcode.
d6f58fd7c7c280218ab60f1656e524b7
198 bytes small macOS/x64 RickRolling shellcode.
629ad7b064b5d84ed3f906842421a4f2
113 bytes small Linux/x64 anti-debug trick (INT3 trap) with execve("/bin/sh") shellcode that is NULL free.
ba4326c992e6781e3f2d205bf50de438
39 bytes small Linux/x86 egghunter null-free shellcode. The egghunter dynamically searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs.
3cc1d7e8ad5391ad63e8cd52726be7e0
80 bytes small Linux/x86 reverse shell generator shellcode with customizable TCP port and IP address.
937201f1ff92ab4fabd623cad7224a07
155 bytes small Linux/x86 shellcode that has a MMX stub decoder that dynamically decodes the payload in memory. The FPU GetPC technique is used to determine the offset from EIP dynamically in running memory. Once decoded. this shellcode adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified.
b4cd1c73f54aff707a22b55b2944bd8d