This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # This script can print out the arguments and return values of `malloc()` and | |
| # `free()`, thanks to the power of GDB-Python. | |
| # | |
| # Usage: load the target program in gdb, wait until libc is loaded (e.g. by | |
| # executing `start`), then execute `source malloc-trace.py`, and enjoy! | |
| # | |
| # Note: this only works for Linux x86_64. Porting should not be difficult if | |
| # you are familiar with the C calling convention on the target platform. | |
| # | |
| # Also, feel free to extend this script with the functionalities you want (e.g. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| ''' | |
| A kernel pwn exploit submitter, optimized for larger binaries and better terminal interactions. | |
| Best suitable when you have a large binary to send (>= 500 KiB), and other (non-chunked and | |
| non-flow-controlled) senders result in truncated and corrupted binaries. | |
| This normally runs at ~150 KiB/s for base64 encoded data, sufficient for use in CTF competitions. | |
| Requires python-pwntools to be installed. | |
| ''' |