A small piece of shellcode written in assembler that can scan the user-land
address space for small blocks of memory ("eggs") and recombine the eggs into
one large block. When done, the large block is executed. This is useful when you
can only insert small blocks at random locations into a process and not one
contiguous large block containing your shellcode in one piece: this code will
recombine the eggs to create your shellcode in the process and execute it.
This version works only on Windows 32-bit platforms because it uses the Windows
specific Structured Exception Handler (SEH) feature to handle access violations
caused by scanning memory.
More details can be found here:
backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13507-1.zip (2009-w32-SEH-omlet-shellcode-v0.2.zip)
backup: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/13507-2.zip (2009-w32-SEH-omlet-shellcode-older-versions.zip)
I have not had a chance to test this newer version in a live exploit, so do
let me know if you have a chance to use it.
# milw0rm.com [2009-03-16]