Skip to content

PwnTools โ€‹

Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks:

pip3 install pwntools

Pwn asm โ€‹

Get opcodes from line or file.

pwn asm "jmp esp" 
pwn asm -i <filepath>

Can select:

  • output type (raw,hex,string,elf)
  • output file context (16,32,64,linux,windows...)
  • avoid bytes (new lines, null, a list)
  • select encoder debug shellcode using gdb run the output

Pwn checksec โ€‹

Checksec script

pwn checksec <executable>

Pwn constgrep โ€‹

Pwn cyclic โ€‹

Get a pattern

pwn cyclic 3000
pwn cyclic -l faad

Can select:

  • The used alphabet (lowercase chars by default)
  • Length of uniq pattern (default 4)
  • context (16,32,64,linux,windows...)
  • Take the offset (-l)

Pwn debug โ€‹

Attach GDB to a process

pwn debug --exec /bin/bash
pwn debug --pid 1234
pwn debug --process bash

Can select:

  • By executable, by name or by pid context (16,32,64,linux,windows...)
  • gdbscript to execute
  • sysrootpath

Pwn disablenx โ€‹

Disable nx of a binary

pwn disablenx <filepath>

Pwn disasm โ€‹

Disas hex opcodes

pwn disasm ffe4

Can select:

  • context (16,32,64,linux,windows...)
  • base addres
  • color(default)/no color

Pwn elfdiff โ€‹

Print differences between 2 fiels

pwn elfdiff <file1> <file2>

Pwn hex โ€‹

Get hexadecimal representation

bash
pwn hex hola #Get hex of "hola" ascii

Pwn phd โ€‹

Get hexdump

pwn phd <file>

Can select:

  • Number of bytes to show
  • Number of bytes per line highlight byte
  • Skip bytes at beginning

Pwn pwnstrip โ€‹

Pwn scrable โ€‹

Pwn shellcraft โ€‹

Get shellcodes

pwn shellcraft -l #List shellcodes 
pwn shellcraft -l amd #Shellcode with amd in the name
pwn shellcraft -f hex amd64.linux.sh #Create in C and run
pwn shellcraft -r amd64.linux.sh #Run to test. Get shell 
pwn shellcraft .r amd64.linux.bindsh 9095 #Bind SH to port

Can select:

  • shellcode and arguments for the shellcode
  • Out file
  • output format
  • debug (attach dbg to shellcode)
  • before (debug trap before code)
  • after
  • avoid using opcodes (default: not null and new line)
  • Run the shellcode
  • Color/no color
  • list syscalls
  • list possible shellcodes
  • Generate ELF as a shared library

Pwn template โ€‹

Get a python template

pwn template

Can select: host, port, user, pass, path and quiet

Pwn unhex โ€‹

From hex to string

pwn unhex 686f6c61

Pwn update โ€‹

To update pwntools

pwn update
Learn AWS hacking from zero to hero with htARTE (HackTricks AWS Red Team Expert)!

Other ways to support HackTricks: