PwnTools

pip3 install pwntools

Pwn asm

Get opcodes from line or file.

pwn asm "jmp esp" 
pwn asm -i <filepath>

Can select:

  • output type (raw,hex,string,elf)

  • output file context (16,32,64,linux,windows...)

  • avoid bytes (new lines, null, a list)

  • select encoder debug shellcode using gdb run the output

Pwn checksec

Checksec script

Pwn constgrep

Pwn cyclic

Get a pattern

Can select:

  • The used alphabet (lowercase chars by default)

  • Length of uniq pattern (default 4)

  • context (16,32,64,linux,windows...)

  • Take the offset (-l)

Pwn debug

Attach GDB to a process

Can select:

  • By executable, by name or by pid context (16,32,64,linux,windows...)

  • gdbscript to execute

  • sysrootpath

Pwn disablenx

Disable nx of a binary

Pwn disasm

Disas hex opcodes

Can select:

  • context (16,32,64,linux,windows...)

  • base addres

  • color(default)/no color

Pwn elfdiff

Print differences between 2 fiels

Pwn hex

Get hexadecimal representation

Pwn phd

Get hexdump

Can select:

  • Number of bytes to show

  • Number of bytes per line highlight byte

  • Skip bytes at beginning

Pwn pwnstrip

Pwn scrable

Pwn shellcraft

Get shellcodes

Can select:

  • shellcode and arguments for the shellcode

  • Out file

  • output format

  • debug (attach dbg to shellcode)

  • before (debug trap before code)

  • after

  • avoid using opcodes (default: not null and new line)

  • Run the shellcode

  • Color/no color

  • list syscalls

  • list possible shellcodes

  • Generate ELF as a shared library

Pwn template

Get a python template

Can select: host, port, user, pass, path and quiet

Pwn unhex

From hex to string

Pwn update

To update pwntools

Last updated