Winamp version 5.12 playlist (.pls) buffer overflow exploit with ASLR + EGGHUNT + REV_SHELL. Written in Python.
a9b323cb439cf09ca1e1857f96364155595651c7e4c96ab60eaf494596a801aa
14 bytes small /sbin/route staged shellcode and can read the second stage from STDIN.
f90549cceec2d1b11ecf4aae6e2b968432729ad968cd9101b8a1b8d12f500291
Linux/x86 polymorphic shellcode for execve(/bin/sh).
9858aa6d8f4d92a761b460a1cec910804adffbe53f7032067351eca04c326c30
Linux/x86 insertion encoder and decoder shellcode.
232a3ba577ebd0f1ab1c5e2f99d661e44cd0cb77813fb985d5c81b3e1fb9f5e4
44 bytes small Linux/x86 execve() /bin/sh NOT encoder and decoder shellcode. This technique is useful for bypassing some AV systems.
6654db7674b9291540e7929faf928cae28e1c8115d25095d7d7e17e3f869355d
45 bytes small Linux/x86 XOR encoder and decoder shellcode tool.
53cc6383c1503adc9fee0b000a25b33ee5a694c3e686d5c465a656763c1d5585
53 bytes small Linux/x86 execve() shellcode that runs bc (terminal calculator).
a52a21780a286e00252a03c928310b2f2177bd2819099427c7f1d5e55e46f4a1
5 bytes small Linux/x86 exit(0) shellcode.
babc1efe806ede5f6ba393593394ffc7d82e5c7ea51ee8014a29dc10acf11209
PDF-XChange Viewer version 2.5 (Build 314.0) suffers from a javascript API remote code execution vulnerability.
cfbace44021f769466ad489c4e0fc85231a8e315fe45d4a3e4f433c425207fad