PwnTools
Last updated
Last updated
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)
Get opcodes from line or file.
Can select:
output type (raw,hex,string,elf)
output file context (16,32,64,linux,windows...)
avoid bytes (new lines, null, a list)
select encoder debug shellcode using gdb run the output
Checksec script
Get a pattern
Can select:
The used alphabet (lowercase chars by default)
Length of uniq pattern (default 4)
context (16,32,64,linux,windows...)
Take the offset (-l)
Attach GDB to a process
Can select:
By executable, by name or by pid context (16,32,64,linux,windows...)
gdbscript to execute
sysrootpath
Disable nx of a binary
Disas hex opcodes
Can select:
context (16,32,64,linux,windows...)
base addres
color(default)/no color
Print differences between 2 files
Get hexadecimal representation
Get hexdump
Can select:
Number of bytes to show
Number of bytes per line highlight byte
Skip bytes at beginning
Get shellcodes
Can select:
shellcode and arguments for the shellcode
Out file
output format
debug (attach dbg to shellcode)
before (debug trap before code)
after
avoid using opcodes (default: not null and new line)
Run the shellcode
Color/no color
list syscalls
list possible shellcodes
Generate ELF as a shared library
Get a python template
Can select: host, port, user, pass, path and quiet
From hex to string
To update pwntools
Learn & practice AWS Hacking:HackTricks Training AWS Red Team Expert (ARTE) Learn & practice GCP Hacking: HackTricks Training GCP Red Team Expert (GRTE)