Search K
Appearance
Appearance
Other ways to support HackTricks:
pip3 install pwntools
Get opcodes from line or file.
pwn asm "jmp esp"
pwn asm -i <filepath>
Can select:
Checksec script
pwn checksec <executable>
Get a pattern
pwn cyclic 3000
pwn cyclic -l faad
Can select:
Attach GDB to a process
pwn debug --exec /bin/bash
pwn debug --pid 1234
pwn debug --process bash
Can select:
Disable nx of a binary
pwn disablenx <filepath>
Disas hex opcodes
pwn disasm ffe4
Can select:
Print differences between 2 fiels
pwn elfdiff <file1> <file2>
Get hexadecimal representation
pwn hex hola #Get hex of "hola" ascii
Get hexdump
pwn phd <file>
Can select:
Get shellcodes
pwn shellcraft -l #List shellcodes
pwn shellcraft -l amd #Shellcode with amd in the name
pwn shellcraft -f hex amd64.linux.sh #Create in C and run
pwn shellcraft -r amd64.linux.sh #Run to test. Get shell
pwn shellcraft .r amd64.linux.bindsh 9095 #Bind SH to port
Can select:
Get a python template
pwn template
Can select: host, port, user, pass, path and quiet
From hex to string
pwn unhex 686f6c61
To update pwntools
pwn update
Other ways to support HackTricks: