// linux/x86 exit(0) polymorphic shellcode - 29 bytes // Febriyanto Nugroho #include <stdio.h> char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x24" "\x80\x6c\x0e\xff\x01\x80\xe9" "\x01\x75\xf6\xeb\x05\xe8\xea" "\xff\xff\xff\x6b\x1e\x5a\xce" "\x81"; int main(int argc, char **argv) { asm("jmp %0;" : "=m" (shellcode)); }