|
1 |
| -# CTF tools & some other stuff |
2 |
| -## Script |
| 1 | +# CTF tools & some other stuff |
| 2 | + |
| 3 | +**2023/01/21 Update:** I rarely play CTF now, so some of the tools might be outdated. |
| 4 | + |
| 5 | +## [ctf-tool](https://github.com/bruce30262/CTF/tree/master/ctf-tool) |
| 6 | +Some installation scripts and test files for testing tools. |
| 7 | + |
| 8 | +## [Script](https://github.com/bruce30262/CTF/tree/master/script) |
| 9 | +Some useful scripts for CTF pwn challenges. |
| 10 | + |
3 | 11 | [exp_template.py](https://github.com/bruce30262/CTF/blob/master/script/exp_template.py)
|
4 | 12 | python script template for CTF pwnable challenges, using [pwntools](https://github.com/Gallopsled/pwntools).
|
5 | 13 |
|
6 | 14 | [armtool.alias](https://github.com/bruce30262/CTF/blob/master/script/armtool.alias)
|
7 |
| -alias setting for qemu & ARM toolchain. |
| 15 | +alias setting for qemu & ARM toolchain. See also: [set_arm_env.sh](https://github.com/bruce30262/CTF/blob/master/script/set_arm_env.sh). |
8 | 16 |
|
9 | 17 | [bruceutils.py](https://github.com/bruce30262/CTF/blob/master/script/bruceutils.py)
|
10 | 18 | Some utilities (ex. pack & unpacking data, socket connection ...) written by me, in case of there is no pwntools to use.
|
11 | 19 |
|
12 | 20 | [brucepwn](https://github.com/bruce30262/CTF/blob/master/script/brucepwn/brucepwn/brucepwn.py)
|
13 |
| -Self made utilities for CTF pwn challenges. |
| 21 | +Self made utilities for CTF pwn challenges. ( **Written in python2**. Will update when I feel like it :P ) |
14 | 22 |
|
15 | 23 | [change_ld.py](https://github.com/bruce30262/CTF/blob/master/script/change_ld.py)
|
16 | 24 | Simple utility to assign new ld.so of the given binary.
|
17 | 25 |
|
18 |
| -## Debugger |
19 |
| -Some config files & tools for the debugger |
20 |
| - |
21 |
| -[gdb](https://github.com/bruce30262/CTF/blob/master/debugger/gdb) |
22 |
| -* Using [pwndbg](https://github.com/pwndbg/pwndbg) as the default GNU debugger. |
23 |
| -* Will detect if gdb-multiarch is needed. |
24 |
| - |
25 |
| -[gef](https://github.com/bruce30262/CTF/blob/master/debugger/gef) |
26 |
| -* [GEF](https://github.com/hugsy/gef) is also a great debugger. |
27 |
| -* Will detect if gdb-multiarch is needed. |
28 |
| - |
29 |
| -[gdbp](https://github.com/bruce30262/CTF/blob/master/debugger/gdbp) |
30 |
| -* [My own peda](https://github.com/bruce30262/peda). |
31 |
| -* Had used this for pretty long time, however I think it's time to move to a more updated gdb plugin. |
32 |
| - |
33 |
| -### Setting: |
34 |
| -* Put `gdb`, `gef`, `gdbp` in the home directory, all of them must be executable. |
35 |
| -* Add the alias setting in `dbg.alias`. |
36 |
| - |
37 |
| -## Shellcode |
38 |
| - shellcode for `execve("/bin/sh", 0, 0)`. |
39 |
| - Currently support `x86`, `x64`, `ARM` & `AArch64`. |
40 |
| - Also [scutils](https://github.com/bruce30262/CTF/tree/master/shellcode/utils) helps me generate shellcode more conveniently. |
| 26 | +## [Shellcode](https://github.com/bruce30262/CTF/tree/master/shellcode) |
| 27 | +Basic shellcode for `execve("/bin/sh", 0, 0)`. Currently support `x86`, `x64`, `ARM` & `AArch64`. |
| 28 | +Nowadays you might just want to use [pwntools shellcraft](https://docs.pwntools.com/en/stable/shellcraft.html) instead, it's way more convenient. |
0 commit comments