Skip to content

MrMatch246/AutoBufferExploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 

Repository files navigation

AutoBufferExploit

Home for Automation Tools and Stuff

This tool uses angr to find magic input string
If this is not working you can insert this in the midroll function and consider checking the postroll function which catches unwanted stuff that comes back.
It is capable of:
  -automatically leaking remote libcs
  -generating payloads and sending them
  -do this on static but non-stripped binarys 
  -do this locally
  -and some WIP stuff
It is NOT capable of:
  -solving your Homework
  -pwning random canaries
  -flying
  -bringing you Coffee while you wait for your Flag (WiP?)
THIS TOOL IS WIP!!!

  
Usage: $python3 AutoBufferExploit.py -f <binaryname> -vic <ip> <port>   
-f <filename> 
-core                   #(Use coredumps)
-vic <ip> <port>
-ibu <startbufsize>
-NoDas                  #(No dealarm shell)
-loc                    #(localonly)
-fupa <fullPath>
-h                      #(help)
-gen <generator>        #(ropper(default)/RopGad/ropperService/RopGen)
-debug                  #(noCore)
-debugCore              #(debug with coredump,only local)
-a <attackType>         #(rop(default)/ret2libc/SOS(shellcode on stack(WIP!!))
-libc <path to libc>
-flag                   #(auto cat flag.txt;cat flag)
-cmd  <shellcommand>   #(custom shell command to be executed as string)
-man (use for manual midroll and postroll)
-dev                    #Enables Dev stuff
-init                   #(WIP! Sets Up ToolChain Run once)

About

Home for Automation Tools and Stuff

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages