Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
One_gadget | 1,763 | 20 | 1 | 2 months ago | 27 | March 25, 2022 | 5 | mit | Ruby | |
The best tool for finding one gadget RCE in libc.so.6 | ||||||||||
Libc Database | 1,449 | 4 months ago | 6 | mit | Shell | |||||
Build a database of libc offsets to simplify exploitation | ||||||||||
Ctf Pwn Tips | 1,294 | 4 years ago | 1 | |||||||
Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that. | ||||||||||
Pwninit | 560 | 2 months ago | 16 | February 15, 2022 | 9 | mit | Rust | |||
pwninit - automate starting binary exploit challenges | ||||||||||
Pwndocker | 557 | 4 months ago | gpl-3.0 | Dockerfile | ||||||
A docker environment for pwn in ctf | ||||||||||
Welpwn | 318 | a year ago | 1 | mit | Python | |||||
💖CTF pwn framework. | ||||||||||
Heapinspect | 160 | 3 years ago | 3 | mit | Python | |||||
🔍Heap analysis tool for CTF pwn. | ||||||||||
Heapinfo | 96 | 1 | 7 months ago | 12 | May 24, 2018 | 1 | mit | Ruby | ||
An interactive memory info for pwning / exploiting | ||||||||||
Libcsearcher | 77 | 4 months ago | 1 | Python | ||||||
🔍 LibcSearcher-ng -- get symbols' offset in glibc. | ||||||||||
Lilac_2020_summer_pwn | 65 | 3 years ago | C | |||||||
Lilac 2020暑期pwn培训课件以及相关文件 |
(Search libc function offset)
CTFPython 3.7
LibclibcLibc.so12
$ git clone https://github.com/Ro0tk1t/LibcSearcher3.git
$ pip3 install -e LibcSearcher3
or
$ pip3 install LibcSearcher3
$ libcsearch --init
from LibcSearcher import *
#,12(d90)int
obj = LibcSearcher("fgets", 0x7ff39014bd90)
obj.dump("system") #system
obj.dump("str_bin_sh") #/bin/sh
obj.dump("__libc_start_main_ret")
$ libcsearch --help
usage: libcsearch [-h] [-i] [-f FUNC] [-d ADDR] [-t TO_LEAK]
optional arguments:
-h, --help show this help message and exit
-i, --init libc
-l LOCAL_LIBC, --local LOCAL_LIBC
libc
-f FUNC, --func FUNC
-d ADDR, --addr ADDR
-t TO_LEAK, --to_leak TO_LEAK
$ libcsearch -f fgets -d 0x7ff39014bd90 -t system
Multi Results:
0: kali-glibc (id libc6-x32_2.31-3_amd64)
1: ubuntu-old-eglibc (id libc6-amd64_2.13-0ubuntu13.2_i386)
2: kali-glibc (id libc6-x32_2.31-3_i386)
3: ubuntu-old-glibc (id libc6_2.19-10ubuntu2_amd64)
4: archive-glibc (id libc6-amd64_2.23-0ubuntu10_i386)
Please supply more info using
add_condition(leaked_func, leaked_address).
You can choose it by hand
Or type 'exit' to quit: 0
[+] kali-glibc (id libc6-x32_2.31-3_amd64) be choosed.
[+] system offset: 0x40130
$ libcsearch -l /usr/lib32/libc-2.31.so
Adding local libc /usr/lib32/libc-2.31.so (id local-189747720230b84e629b7fb77ecb4006416e3ada /usr/lib32/libc-2.31.so)
-> Writing symbols to ../db/local-189747720230b84e629b7fb77ecb4006416e3ada.symbols
-> Writing version info
libcadd_condition(leaked_func, leaked_address)
libc
bug
linuxlibc