pwntools
# Exploit development library 
# import all from module 
from pwn import *
# Cyclic pattern for overflow 
print.(cyclic(50))
# Work with shell code or assembly 
print(shellcract.sh())
print(hexdump(asm(shellcraft.sh())))
# Start a local process 
p = process("/bin/sh")
p.sendline("echo hello;")
p.interactive()
# Start a remote process
## Declare remote IP and port
r = remote("127.0.0.1", 1234)
# send command
r.sendline("hello!")
# Create interactive shell 
r.interactive()
# Close the connection
r.close()
# Pack numbers 
print(p32(0x13371337))
# Unpack numbers 
print(u32(0x13371337))
# Load files 
l = ELF('/bin/bash')
print(hex(l.address))
# See entry point 
print(hex(l.entry))
# Find information about a binary 
print(hex(l.got['write']))
print(hex(l.plt['write']))
# Encryption 
print(xor("A", "B"))
print(b64e(b"test"))
print(md5sumhex(b"hello"))
print(sha1sumhex(b"hello"))Last updated