Research
Security News
Malicious npm Packages Inject SSH Backdoors via Typosquatted Libraries
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
.. figure:: https://github.com/Gallopsled/pwntools/blob/stable/docs/source/logo.png?raw=true :alt: pwntools logo
pwntools logo
|PyPI| |Docs| |Travis| |GitHub Workflow Status (branch)| |Coveralls| |MIT License| |Discord| |Twitter|
Pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.
.. code:: python
from pwn import * context(arch = 'i386', os = 'linux')
r = remote('exploitme.example.com', 31337)
r.send(asm(shellcraft.sh())) r.interactive()
Our documentation is available at
docs.pwntools.com <https://docs.pwntools.com/>
__
A series of tutorials is also available online <https://github.com/Gallopsled/pwntools-tutorial#readme>
__
To get you started, we’ve provided some example solutions for past CTF
challenges in our write-ups repository <https://github.com/Gallopsled/pwntools-write-ups>
__.
Pwntools is best supported on 64-bit Ubuntu LTS releases (14.04, 16.04, 18.04, and 20.04). Most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).
Python3 is suggested, but Pwntools still works with Python 2.7. Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with
.. code:: sh
apt-get update apt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential python3 -m pip install --upgrade pip python3 -m pip install --upgrade pwntools
However, some of the features (assembling/disassembling foreign
architectures) require non-Python dependencies. For more information,
see the complete installation instructions here <https://docs.pwntools.com/en/stable/install.html>
__.
See CONTRIBUTING.md <CONTRIBUTING.md>
__
If you have any questions not worthy of a bug report <https://github.com/Gallopsled/pwntools/issues>
__, join the
Discord server at https://discord.gg/96VA2zvjCB
.. |PyPI| image:: https://img.shields.io/pypi/v/pwntools?style=flat :target: https://pypi.python.org/pypi/pwntools/ .. |Docs| image:: https://readthedocs.org/projects/pwntools/badge/?version=stable :target: https://docs.pwntools.com/ .. |Travis| image:: https://img.shields.io/travis/Gallopsled/pwntools/dev?logo=Travis :target: https://travis-ci.org/Gallopsled/pwntools .. |GitHub Workflow Status (branch)| image:: https://img.shields.io/github/workflow/status/Gallopsled/pwntools/Continuous%20Integration/dev?logo=GitHub :target: https://github.com/Gallopsled/pwntools/actions?query=workflow%3A%22Continuous+Integration%22+branch%3Adev .. |Coveralls| image:: https://img.shields.io/coveralls/github/Gallopsled/pwntools/dev?logo=coveralls :target: https://coveralls.io/github/Gallopsled/pwntools?branch=dev .. |MIT License| image:: https://img.shields.io/badge/license-MIT-blue.svg?style=flat :target: http://choosealicense.com/licenses/mit/ .. |Discord| image:: https://img.shields.io/discord/809590285687980052?label=Discord&style=plastic :target: https://discord.gg/96VA2zvjCB .. |Twitter| image:: https://img.shields.io/twitter/follow/Pwntools :target: https://twitter.com/pwntools
FAQs
Pwntools CTF framework and exploit development library.
We found that angr-pwntools demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
Socket’s threat research team has detected six malicious npm packages typosquatting popular libraries to insert SSH backdoors.
Security News
MITRE's 2024 CWE Top 25 highlights critical software vulnerabilities like XSS, SQL Injection, and CSRF, reflecting shifts due to a refined ranking methodology.
Security News
In this segment of the Risky Business podcast, Feross Aboukhadijeh and Patrick Gray discuss the challenges of tracking malware discovered in open source softare.