| example_1.c | This is a Linux/i386 ShellCode that writes "I'm Here!!!" to stout. | 
| example_2.c | This is a BSD/i386 ShellCode that exec a setuid(0), then writes "Someone was here !!!" to /root/readme. | 
| example_3.c | This is a Linux/i386 ShellCode that exec a setuid(0), then writes "I'm looking you..." to /dev/tty. | 
| example_4.c | This is a BSD/i386 polymorphic ShellCode that exec a setuid(0) and a setgid(0), then executes /bin/sh and exit(0). | 
| example_5.c | This is a Linux/i386 polymorphic ShellCode that exec a setuid(0), then evade from chroot and executes /usr/X11R6/bin/xterm -display 192.168.1.50:0.0 and exit(0). | 
| example_6.c | This is a Linux/i386 ShellCode that exec a setuid(0) and a setgid(0), then listens to the port 12345 and when receves a connection fork()s. The child first evade from chroot then executes /bin/sh and exit(0). The father listens for the next connection. | 
| example_7.c | This is a Linux/i386 ShellCode that exec a setuid(0), then listens to the port 54321 and when receves a connection first evade from chroot then executes /bin/cat /etc/passwd /etc/shadow and exit(0). | 
| example_8.c | This is a Linux/i386 polymorphic ShellCode that opens a connection to 192.168.1.50:8000 and exec a setuid(0) and a setgid(0), then evade from chroot and executes /bin/sh and exit(0). | 
| example_9.c | This is a Linux/i386 polymorphic ShellCode that opens a connection to 192.168.1.50:9000 and exec a setuid(0), then evade from chroot and executes /bin/grep root /etc/shadow and exit(0). | 
| example_10.c | This is a Linux/i386 polymorphic ShellCode that reuse the opened connection from 192.168.1.50:80 and exec a setuid(0) and a setgid(0), then evade from chroot and executes /bin/sh and exit(0). |