exp_template.py
python script template for CTF pwnable challenges, using pwntools
armtool.alias
alias setting for qemu & ARM toolchain
bruceutils.py
Some utilities (ex. pack & unpacking data, socket connection ...) written by me, in case of there is no pwntools to use.
some config files & tools for the debugger
gdb
Using peda for the default GNU debugger
pgdb
Using pwndbg for tracing ARM & ARM64 binary ( have to install gdb-multiarch first)
ga & pga
Script for attaching process
Usage: (p)ga [process name]
- Put
gdb
,pgdb
,ga
&pga
in the home directory, all of them must be executable - Add the alias setting in
dbg.alias
py-gdb
With the help of pwntools, py-gdb
allow users to communicate with gdb by writing a simple python script.
Here's an example
shellcode for execve("/bin/sh", 0, 0)
now support x86
, x64
, ARM
& AArch64
Also scutils helps me generate shellcode more conveniently