SNIPPETS
stringlengths
2
1.64k
INTENTS
stringlengths
4
1.66k
push byte 0x77
push the byte 0x77 to the stack
push byte 0x77
push the byte 0x77 onto the stack
push byte 0x77 \n pop eax
put the syscall 0x77 into the eax register
push byte 0x77 \n push word 0x6f64 \n push 0x6168732f \n push 0x6374652f \n mov ebx, esp
load the string /etc/shadow in ebx register
push byte 0x8 \n mov edx, esp
push the byte 0x8 onto the stack and point edx to the stack register
push byte 0xb
push the byte 0xb onto the stack
push byte 0xb \n pop eax
load execve syscall into eax register
push byte 0xb \n pop eax
put the syscall 0xb into the eax register
push byte 0xc
push the byte 0xc onto the stack
push byte 0xc \n pop eax
put the syscall 0xc into the eax register
push byte 0xc \n pop eax \n dec eax
load execve syscall into eax register
push byte 1
move byte 1 onto stack
push byte 1
push byte 1 onto the stack
push byte 1
push the byte 1 to the stack
push byte 1
push the byte 1 onto the stack
push byte 1 \n mov eax, esp
push the byte 1 onto the stack and point eax to the stack register
push byte 1 \n pop eax
load exit syscall into eax register
push byte 1 \n pop eax
load __nr_execve syscall into eax register
push byte 1 \n pop eax
put the syscall 1 into the eax register
push byte 1 \n pop eax \n int 0x80
load syscall exit in al register and call kernel
push byte 10
push the byte 10 onto the stack
push byte 10
push the byte 10 to the stack
push byte 10 \n pop eax
put the syscall 10 into the eax register
push byte 11
push the byte 11 onto the stack
push byte 11
push the byte 11 to the stack
push byte 11 \n pop eax
put the syscall 11 into the eax register
push byte 15
push the byte 15 onto the stack
push byte 15
push the byte 15 to the stack
push byte 15 \n pop eax
move the function chmod in al register
push byte 15 \n pop eax
put the syscall 15 into the eax register
push byte 16
push byte 16 onto stack
push byte 16
push the byte 16 onto the stack
push byte 16 \n pop eax
put the syscall 16 into the eax register
push byte 16 \n push ecx \n push edi
push 16, *ptr and file descriptor on stack
push byte 17h
push the byte 17h onto the stack
push byte 17h \n pop eax
put the syscall 17h into the eax register
push byte 2
push byte 2 onto the stack
push byte 2
push the byte 2 onto the stack
push byte 2 \n pop eax
put the syscall 2 into the eax register
push byte 2 \n pop ecx
load byte 2 into ecx register
push byte 2 \n pop ecx
save the byte 2 into ecx register
push byte 2 \n pop edx
load the byte 2 into edx register
push byte 2 \n push esi
push the byte 2 and esi content on stack
push byte 25
push the byte 25 onto the stack
push byte 25 \n pop eax
put the syscall 25 into the eax register
push byte 28
push the lenght of sockaddr_in6 = 28 byte
push byte 28
push the byte 28 to the stack
push byte 28 \n pop eax
put the syscall 28 into the eax register
push byte 3 \n mov ebx, esp
push the byte 3 onto the stack and point ebx to the stack register
push byte 37
push the byte 37 onto the stack
push byte 37 \n pop eax
put the syscall 37 into the eax register
push byte 3h
push the byte 3h onto the stack
push byte 3h \n pop eax
put the syscall 3h into the eax register
push byte 4
push the byte 4 onto the stack
push byte 4 \n pop eax
load byte 4 into eax register
push byte 4 \n pop eax
load __nr_write into eax
push byte 4 \n pop eax
put the syscall 4 into the eax register
push byte 49
push the byte 49 onto the stack
push byte 49 \n pop eax
put the syscall 49 into the eax register
push byte 5
push 5 on stack
push byte 5
push the byte 5 onto the stack
push byte 5 \n pop eax
load byte 5 into eax register
push byte 5 \n pop eax
load __nr_open into eax register
push byte 5 \n pop eax
put the syscall 5 into the eax register
push byte 54
push the byte 54 onto the stack
push byte 54 \n pop eax
put the syscall 54 into the eax register
push byte 6
push byte 6 onto the stack
push byte 6
push the byte 6 onto the stack
push byte 6
push the byte 6 to the stack
push byte 6 \n pop eax
put the syscall 6 into the eax register
push byte 6 \n push byte 0x1 \n push byte 10
push the byte 6, 0x1 and 10 on stack
push byte 67
push the byte 67 onto the stack
push byte 67 \n pop eax
load sigaction syscall number into eax register
push byte 67 \n pop eax
put the syscall 67 into the eax register
push byte 70
push the byte 70 onto the stack
push byte 70 \n pop eax
put the syscall 70 into the eax register
push byte 8
push the byte 8 onto the stack
push byte 8 \ n pop eax
load __nr_creat into al register
push byte 8 \n pop eax
put the syscall 8 into the eax register
push byte 9
push the byte 9 onto the stack
push byte 9 \n pop eax
put the syscall 9 into the eax register
push byte chmod_call
push the byte chmod_call onto the stack
push byte chmod_call \n pop eax
move the function chmod in al register
push byte CHMOD_CALL \n pop eax
put the byte my_label into the eax register
push byte CHMOD_CALL \n pop eax
put the byte CHMOD_CALL into the eax register
push byte L1 \n pop eax
put the byte L1 into the eax register
push byte my_value \n pop eax
put the byte my_value into the eax register
push byte VALUE \n pop eax
put the byte VALUE into the eax register
push cx
push the contents of the cx register onto the stack
push dword [ebp+16]
push the dword [ebp+16] onto the stack
push dword [edx+2]
push the double word stored a edx+2 location on stack
push dword [edx+2]
push the doubleword [edx+2] to the stack
push dword [edx+2]
push the dword [edx+2] onto the stack
push dword 0x00000000
push the doubleword 0x00000000 onto the stack
push dword 0x0101017f
push the dword 0x0101017f onto the stack
push dword 0x017aa8c0
push the dword 0x017aa8c0 onto the stack
push dword 0x0501a8c0
push the value of local ip = 192.168.1.5 on stack
push dword 0x0501a8c0
push the dword 0x0501a8c0 onto the stack
push dword 0x0a206873
push the double word 0x0a206873 onto the stack
push dword 0x10
push the dword 0x10 onto the stack