[shellcode] Linux/x86 – execve(/bin/sh) using JMP-CALL-POP Shellcode (21 bytes)
Posted by deepcore on July 1, 2019 – 12:00 am
Linux/x86 – execve(/bin/sh) using JMP-CALL-POP Shellcode (21 bytes)
Linux/x86 – execve(/bin/sh) using JMP-CALL-POP Shellcode (21 bytes)
Post a reply
You must be logged in to post a comment.