Home
cyberkhalid
Cancel

Linux/86 Delete file -> Jmp-call-pop,XOR

Info Description: Shellcode to delete a file. Platform: Linux Arch: x86 Size: 30 bytes Technique: jmp-call-pop, XOR Shellcode : \xeb\x0d\x5b\x31\xc0\xb0\x0a\xcd\x80\x31\xdb\xb0\x01\xcd\x80\xe...

Linux/86 Create Directory (mkdir)-> Jmp-call-pop,XOR

Info Description: Shellcode to create a directory. Platform: Linux Arch: x86 Size: 29 bytes Technique: jmp-call-pop, XOR Shellcode : \xeb\x13\x5b\x31\xc0\x31\xc9\xb0\x27\x66\xb9\xc0\x01\xcd\x...

Linux/86 Helloword -> Jmp-call-pop,XOR

Info Description: Shellcode to print Hello World Platform: Linux Arch: x86 Size: 38 bytes Technique: Jmp-call-pop, XOR Shellcode : \xeb\x13\x59\x31\xc0\x31\xdb\x31\xd2\xb0\x04\xb3\x01\xb2\x0c...

Linux/86 Helloword -> Stack,XOR

Info Description: Shellcode to print Hello World Platform: Linux Arch: x86 Size: 36 bytes Technique: Stack, XOR Shellcode : \x68\x72\x6c\x64\x0a\x68\x6f\x20\x57\x6f\x68\x48\x65\x6c\x6c\x31\xc...

Linux/86 execve -> Stack,XOR

Info Description: Shellcode to spawn /bin/sh Platform: Linux Arch: x86 Size: 28 bytes Technique: Stack, XOR Shellcode : \x31\xc0\x50\x8d\x14\x24\x68\x6e\x2f\x73\x68\x68\x2f\x2f\x62\x69\x8d\x1...

Linux/86 Create file -> Jmp-call-pop,Stack,XOR

Info Description: Shellcode to create a file and write data into it. Platform: Linux Arch: x86 Size: 65 bytes Technique: jmp-call-pop,Stack, XOR Shellcode : \xeb\x30\x5b\x31\xc0\x31\xc9\xb0\x...

Linux/86 cat /etc/passwd -> Stack,XOR

Info Description: Shellcode to retrive /etc/passwd file using /bin/cat Platform: Linux Arch: x86 Size: 48 bytes Technique: Stack, XOR Shellcode : \x31\xc0\x50\x8d\x14\x24\x68\x2f\x63\x61\x74\...

SSH Pentesting -> Pivoting

Pivoting: mitre -> TA0008, T1572 Pivoting Is a technique of routing network traffics from one system to another system or networks. Is a technigue that adversary uses to move from one compromis...

SSH Pentesting -> Persistence

persistence: mitre -> TA0003 Persistence Is a technigue that allows adversary to maintain access to a compromised system for a period of time. technigues SSH Authorized Keys : mitre -> T...

SSH Pentesting

SSH SSH stands for Secure Shell or Secure Socket Shell, is a protocol for secure remote login from one computer to another.It provides users with a secure way to access and manage a computer over a...