[shellcode] Linux/x86 – execve /bin/sh using JMP-CALL-POP Shellcode (21 bytes)

Linux/x86 – execve /bin/sh using JMP-CALL-POP Shellcode (21 bytes)

from Exploit-DB.com RSS Feed https://ift.tt/2RPQlgc
via IFTTT