Aerosol Posted January 17, 2015 Report Posted January 17, 2015 This is the CTF framework used by Gallopsled in every CTF.from pwn import *context(arch = 'i386', os = 'linux')r = remote('exploitme.example.com', 31337)# EXPLOIT CODE GOES HEREr.send(asm(shellcraft.sh()))r.interactive()However we have made command-line frontends for some of the functionality in pwnlib. These areasm/disasm: Small wrapper for various assemblers.constgrep: Tool for finding constants defined in header files.cyclic: De Bruijn sequence generator and lookup tool.hex/unhex: Command line tools for doing common hexing/unhexing operations.shellcraft: Frontend to our shellcode.phd: Replacement for hexdump with colors.Installationpwntools is best supported on Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly withpip install pwntoolsHowever, some of the features (ROP generation and assembling/disassembling foreign architectures) require non-Python dependencies. For more information, see the complete installation instructions here.Download: https://github.com/Gallopsled/pwntools Quote