{"id":3854,"date":"2015-01-13T16:48:05","date_gmt":"2015-01-13T08:48:05","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3854"},"modified":"2015-01-13T16:49:01","modified_gmt":"2015-01-13T08:49:01","slug":"pwntools-ctf-framework-exploit-development-library","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2015\/01\/pwntools-ctf-framework-exploit-development-library\/","title":{"rendered":"pwntools – CTF Framework & Exploit Development Library"},"content":{"rendered":"
pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.<\/p>\n
<\/p>\n
Command-line frontends for some of the functionality are available:<\/p>\n
Usage<\/strong><\/p>\n Requirements<\/strong><\/p>\n pwntools is best supported on Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).<\/p>\n Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with:<\/p>\n However, some of the features (ROP generation and assembling\/disassembling foreign architectures) require non-Python dependencies. For more information, see the complete installation instructions here<\/a>.<\/p>\n You can download pwntools here:<\/p>\nfrom pwn import *\r\ncontext(arch = 'i386', os = 'linux')\r\n\r\nr = remote('exploitme.example.com', 31337)\r\n# EXPLOIT CODE GOES HERE\r\nr.send(asm(shellcraft.sh()))\r\nr.interactive()<\/pre>\n
pip install pwntools<\/pre>\n