SNIPPETS
stringlengths
2
1.64k
INTENTS
stringlengths
4
1.66k
push 0x7369642d
push 0x7369642d to the stack
push 0x7369642d
push 0x7369642d onto the stack
push 0x7372656f
push the 0x7372656f onto the stack
push 0x7372656f
push 0x7372656f to the stack
push 0x7372656f
push 0x7372656f onto the stack
push 0x7372656f \n push 0x6475732f \n push 0x6374652f
push Ò/etc/sudoersÓ on stack
push 0x7372656f \n push 0x6475732f \n push 0x6374652f
push Ô/etc/sudoersÕ into stack
push 0x7374736f
push 0x7374736f onto the stack
push 0x7374736f
push the 0x7374736f onto the stack
push 0x7374736f \n push 0x682f6374 \n push 0x652f2f2f
push the string ///etc/hosts on stack
push 0x74
push 0x74 onto the stack
push 0x74
push 0x74 to the stack
push 0x74 \n push 0x6567772f \n push 0x6e69622f \n push 0x7273752f \n mov ebx,esp
load the string /usr/bin/wget in ebx regsiter
push 0x742f2f2f
push 0x742f2f2f onto the stack
push 0x742f2f2f
push the 0x742f2f2f onto the stack
push 0x742f3a31
push 0x742f3a31 onto the stack
push 0x74303072
push 0x74303072 onto the stack
push 0x7461632f \n push 0x6e69622f \n mov eax, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the eax register to the stack register
push 0x7461632f \n push 0x6e69622f \n mov ebx, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the ebx register to the stack register
push 0x7461632f \n push 0x6e69622f \n mov ecx, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the ecx register to the stack register
push 0x7461632f \n push 0x6e69622f \n mov edi, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the edi register to the stack register
push 0x7461632f \n push 0x6e69622f \n mov edx, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the edx register to the stack register
push 0x7461632f \n push 0x6e69622f \n mov esi, esp
push the value 0x7461632f and the value 0x6e69622f onto the stack and point the esi register to the stack register
push 0x74652f2f
push the 0x74652f2f onto the stack
push 0x74652f2f
push 0x74652f2f onto the stack
push 0x746f6f72
push 0x746f6f72 onto the stack
push 0x74756873
push the 0x74756873 onto the stack
push 0x74756f2f
push 0x74756f2f onto the stack
push 0x74756f2f
push the 0x74756f2f onto the stack
push 0x752f2f2f
push 0x752f2f2f onto the stack
push 0x752f2f2f
push 0x752f2f2f to the stack
push 0x7665642f
push 0x7665642f onto the stack
push 0x7665642f
push the 0x7665642f onto the stack
push 0x76766c2d
push 0x76766c2d onto the stack
push 0x76766c2d
push 0x76766c2d to the stack
push 0x76766c2d
push the 0x76766c2d onto the stack
push 0x776f6461 \n push 0x68732f63 \n push 0x74652f2f
push the string Ô//etc/shadowÕ on stack
push 0x776f6461 \n push 0x6873672f \n push 0x6374652f \n mov ebx, esp
load the string Ô/etc/gshadowÕ into ebx regsiter
push 0x776f6490 \n pop ebx
load hexadecimal value 0x776f6490 into ebx register
push 0x78
push 0x78 onto the stack
push 0x78
push 0x78 to the stack
push 0x78
push the 0x78 onto the stack
push 0x78 \n mov ebx, esp
move the character x in ebx register
push 0x782f2f32
push 0x782f2f32 onto the stack
push 0x782f2f32
push 0x782f2f32 to the stack
push 0x782f6e69
push 0x782f6e69 onto the stack
push 0x782f6e69
push 0x782f6e69 to the stack
push 0x78534a52
push 0x78534a52 onto the stack
push 0x79616c70
push 0x79616c70 to the stack
push 0x79616c70
push 0x79616c70 onto the stack
push 0x8
push 0x8 onto the stack
push 0x81e3a8c0
push inet_addr 192.168.227.129 (hex)
push 0x81e3a8c0
push 0x81e3a8c0 onto the stack
push 0x8501a8c0
push ip address 192.168.1.133 (hex)
push 0x8501a8c0
push 0x8501a8c0 onto the stack
push 0xa
push af_inet6 value, 10, on stack
push 0xa
push af_inet6 = 10 on stack
push 0xa
push 0xa onto the stack
push 0xa
push 0xa to the stack
push 0xa01a8c0
push the 0xa01a8c0 onto the stack
push 0xb
push 0xb to the stack
push 0xb
push 0xb onto the stack
push 0xb \n pop eax
load execve in eax
push 0xb \n pop eax
load __nr_execve into eax register
push 0xb \n pop eax
load __nr_execve syscall into eax register
push 0xb \n pop eax
load execve syscall number into eax register
push 0xb \n pop eax
load execve syscall number into eax reegisster
push 0xb \n pop eax
load execve syscall into eax register
push 0xb pop eax
push the hexadecimal value 0xb on the stack and put it in eax register taking it from the stack
push 0xc \n pop eax \n pop edx
load hexadecimal value into eax and edx content
push 0xdebf
push 0xdebf value to the stack
push 0xefffff7f
push ip address 127.255.255.254 on stack
push 0xefffff7f
push 0xefffff7f onto the stack
push 0xf
push 0xf onto the stack
push 0xf \n pop eax
load chmod syscall number into eax register
push 0xf \n pop eax
load chmod syscall into eax
push 0xf \n pop eax
load chmod syscall into eax register
push 0xffffff90 \n pop ebx
push hexadecimal value 0xffffff90 into ebx register
push 0xfffffffa
push hexadecimal value 0xfffffffa on stack
push 1
push 1 to the stack
push 1
push 1 onto the stack
push 10
push 10 onto the stack
push 10 \n mov eax, esp
push the value 10 onto the stack and point eax to the stack register
push 102
push syscall for socketcall() 102
push 102
push 102 onto the stack
push 12 \n mov ebx, esp
push the value 12 onto the stack and point ebx to the stack register
push 15 \n mov ecx, esp
push the value 15 onto the stack and point ecx to the stack register
push 16
push 16 onto the stack (addrlen = 16)
push 16
push the size of strcut sockaddr_in
push 16
push 16 onto the stack
push 2
push 2 onto stack (af_inet = 2)
push 2
push 2 onto the stack
push 20
push 20 onto the stack
push 20
push the 20 onto the stack
push 216
push 216 value to the stack
push 6
push 6 onto the stack
push 6 \n push 1 \n push 10
push the values 6, 1 and 10 on stack
push ax
push ax onto the stack
push ax
push ax to the stack
push ax
push the ax onto the stack