How to decrypt shell code of an exploit?