/pwnshop

Exploit development topics

Primary LanguageJupyter Notebook

pwnshop

Notes, cheatsheets, shellcode and exploits.

Progress:

  • Utility - Object/Executable file to shellcode converter script: code
  • Utility - Assembly and link script : code
  • Utility - Shellcode testing skeleton generator : code
  • Exit syscall asm: code
  • Write syscall "Hello world!": code
  • Execve shellcode (dynamic addressing) code
  • Ret2libc exploit for protostar stack6 challenge : code
  • Exploit for protostar stack7 challenge (Smallest ROP chain): code
  • Writeup for protostar stack challenges: [WIP]
  • Exploit for VUPlayer 2.49 (no DEP) local buffer overflow: code, writeup
  • Exploit for FreeFloat FTP, remote buffer overflow: [WIP+WRITEUP]
  • Protostar format string challenges [WIP]
  • Execve shellcode (stack method) : code
  • Execve shellcode using RIP relative addressing code
  • Password Protected Bind Shell (Linux/x64) code, writeup
  • Password Protected Reverse Shell (Linux/x64) code, writeup
  • XANAX - A custom shellcode encoder written in assembly : encoder code, decoder code, writeup
  • A more generic (and somewhat extensible) encoder skeleton written in Go code
  • Gocryper : A custom AES shellcode crypter written in Go code, writeup
  • A basic Polimorphic Engine [code]{WIP}, [writeup]{WIP}
  • Egg-hunter shellcode (Linux/x64) [code]{WIP}, [writeup]{WIP}

Related resources:

  • live overflow
  • the shellcodes handbook
  • exploit-education's protostar and fusion challenges
  • gynvael coldwind
  • corelan
  • fuzzysecurity