PwnTools
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Pwn asm
Get opcodes from line or file.
Can select:
output type (raw,hex,string,elf)
output file context (16,32,64,linux,windows...)
avoid bytes (new lines, null, a list)
select encoder debug shellcode using gdb run the output
Pwn checksec
Checksec script
Pwn constgrep
Pwn cyclic
Get a pattern
Can select:
The used alphabet (lowercase chars by default)
Length of uniq pattern (default 4)
context (16,32,64,linux,windows...)
Take the offset (-l)
Pwn debug
Attach GDB to a process
Can select:
By executable, by name or by pid context (16,32,64,linux,windows...)
gdbscript to execute
sysrootpath
Pwn disablenx
Disable nx of a binary
Pwn disasm
Disas hex opcodes
Can select:
context (16,32,64,linux,windows...)
base addres
color(default)/no color
Pwn elfdiff
Print differences between 2 fiels
Pwn hex
Get hexadecimal representation
Pwn phd
Get hexdump
Can select:
Number of bytes to show
Number of bytes per line highlight byte
Skip bytes at beginning
Pwn pwnstrip
Pwn scrable
Pwn shellcraft
Get shellcodes
Can select:
shellcode and arguments for the shellcode
Out file
output format
debug (attach dbg to shellcode)
before (debug trap before code)
after
avoid using opcodes (default: not null and new line)
Run the shellcode
Color/no color
list syscalls
list possible shellcodes
Generate ELF as a shared library
Pwn template
Get a python template
Can select: host, port, user, pass, path and quiet
Pwn unhex
From hex to string
Pwn update
To update pwntools
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Last updated