[AD REMOVED]
Pwn asm
Get opcodes from line or file.
Can select:
- output type (raw,hex,string,elf)
- output file context (16,32,64,linux,windows...)
- avoid bytes (new lines, null, a list)
- select encoder debug shellcode using gdb run the output
Pwn checksec
Checksec script
Pwn constgrep
Pwn cyclic
Get a pattern
Can select:
- The used alphabet (lowercase chars by default)
- Length of uniq pattern (default 4)
- context (16,32,64,linux,windows...)
- Take the offset (-l)
Pwn debug
Attach GDB to a process
Can select:
- By executable, by name or by pid context (16,32,64,linux,windows...)
- gdbscript to execute
- sysrootpath
Pwn disablenx
Disable nx of a binary
Pwn disasm
Disas hex opcodes
Can select:
- context (16,32,64,linux,windows...)
- base addres
- color(default)/no color
Pwn elfdiff
Print differences between 2 fiels
Pwn hex
Get hexadecimal representation
Pwn phd
Get hexdump
Can select:
- Number of bytes to show
- Number of bytes per line highlight byte
- Skip bytes at beginning
Pwn pwnstrip
Pwn scrable
Pwn shellcraft
Get shellcodes
pwn shellcraft -l #List shellcodes
pwn shellcraft -l amd #Shellcode with amd in the name
pwn shellcraft -f hex amd64.linux.sh #Create in C and run
pwn shellcraft -r amd64.linux.sh #Run to test. Get shell
pwn shellcraft .r amd64.linux.bindsh 9095 #Bind SH to port
Can select:
- shellcode and arguments for the shellcode
- Out file
- output format
- debug (attach dbg to shellcode)
- before (debug trap before code)
- after
- avoid using opcodes (default: not null and new line)
- Run the shellcode
- Color/no color
- list syscalls
- list possible shellcodes
- Generate ELF as a shared library
Pwn template
Get a python template
Can select: host, port, user, pass, path and quiet
Pwn unhex
From hex to string
Pwn update
To update pwntools
[AD REMOVED]