The next development in exploit payloads, Shellcode, are discussed. Shellcode's widespread adoption as the payload of choice indicates an advancement in exploit quality and sophistication. Using shellcode payloads, the attacker avoids the need to alter the compromised system's file system in any way to achieve his or her goals. It is most suitable for exploits in which the attacker already has interactive access to the vulnerable system. The simplest network-aware shellcode initiate a command interpreter that functions as a typical network server program.