- Notifications
You must be signed in to change notification settings - Fork0
See README.md for pull requests
License
TwoUnderscorez/pwntools
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
#1667:i386 ascii shellcode
#1693:Fix documentation of #1667
Pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.
frompwnimport*context(arch='i386',os='linux')r=remote('exploitme.example.com',31337)# EXPLOIT CODE GOES HEREr.send(asm(shellcraft.sh()))r.interactive()
Our documentation is available atdocs.pwntools.com
A series of tutorials is alsoavailable online
To get you started, we've provided some example solutions for past CTF challenges in ourwrite-ups repository.
Pwntools is best supported on 64-bit Ubuntu LTE releases (14.04, 16.04, 18.04, and 20.04). Most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.). Python >= 2.7 is required (Python 3 suggested as best).
Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with
apt-get updateapt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev build-essentialpython3 -m pip install --upgrade pippython3 -m pip install --upgrade pwntools
However, some of the features (assembling/disassembling foreign architectures) require non-Python dependencies. For more information, see thecomplete installation instructions here.
If you have any questions not worthy of abug report, feel free to ping usat#pwntools
on Freenode and ask away.Clickhere to connect.There is also amailing list for higher latency discussion.
About
See README.md for pull requests
Resources
License
Stars
Watchers
Forks
Packages0
Languages
- Python55.0%
- Assembly44.4%
- Other0.6%