Copyright © This program is free software Foundation: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. https://www.gnu.org/licenses/gpl-3.0.en.html
In the beginning there were bugs, and it was good. Bugs alone, however, are too woefully negative to be thought of in an emotively good light. For that reason, the hacker invented the exploit; the positive contribution to correct the problem of the negative stigma associated with the bug. With this exploit, and from the depths of the hacker’s kind heart, the hacker offered the program a chance to recover from a critical error by lending it some custom defined code to run in place of where it would have otherwise crashed. And so it was that the term came to be known as shellcode, a protective shell for an otherwise doomed program, and it was good.