All Projects → bet4it → Hyperpwn

bet4it / Hyperpwn

Licence: mit
A hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda

Programming Languages

javascript
184084 projects - #8 most used programming language

Projects that are alternatives of or similar to Hyperpwn

Gef
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+984.5%)
Mutual labels:  exploit, ctf, pwn, reverse-engineering, debugging, gdb
Ctf All In One
CTF竞赛权威指南
Stars: ✭ 2,807 (+625.32%)
Mutual labels:  exploit, ctf, pwn, reverse-engineering
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-88.37%)
Mutual labels:  exploit, ctf, pwn, reverse-engineering
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (-68.48%)
Mutual labels:  exploit, gdb, pwn, ctf
Pwndbg
Exploit Development and Reverse Engineering with GDB Made Easy
Stars: ✭ 4,178 (+979.59%)
Mutual labels:  ctf, reverse-engineering, debugging, gdb
CTF
My CTF tools & some other stuff
Stars: ✭ 17 (-95.61%)
Mutual labels:  gdb, pwn, ctf
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+106.46%)
Mutual labels:  exploit, ctf, pwn
pwnscripts
Very simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-82.95%)
Mutual labels:  exploit, pwn, ctf
Gdb Static
Public repository of static GDB and GDBServer
Stars: ✭ 103 (-73.39%)
Mutual labels:  exploit, reverse-engineering, gdb
Pwndra
A collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+7.75%)
Mutual labels:  ctf, pwn, reverse-engineering
Chimay Red
Mikrotik RouterOS (6.x < 6.38.5) exploit kit. Reverse engineered from the "Vault 7" WikiLeaks publication.
Stars: ✭ 63 (-83.72%)
Mutual labels:  exploit, reverse-engineering, debugging
Awesome Hacking Resources
A collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+2862.79%)
Mutual labels:  exploit, ctf, reverse-engineering
Build An Efficient Pwn Environment
How to build an efficient pwn development environment in 2020
Stars: ✭ 191 (-50.65%)
Mutual labels:  ctf, pwn, gdb
Exrop
Automatic ROPChain Generation
Stars: ✭ 191 (-50.65%)
Mutual labels:  ctf, pwn, reverse-engineering
heaptrace
helps visualize heap operations for pwn and debugging
Stars: ✭ 252 (-34.88%)
Mutual labels:  debugging, pwn, ctf
Slides
won't maintain
Stars: ✭ 79 (-79.59%)
Mutual labels:  ctf, pwn, reverse-engineering
One gadget
The best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+237.47%)
Mutual labels:  exploit, ctf, pwn
Heapinspect
🔍Heap analysis tool for CTF pwn.
Stars: ✭ 177 (-54.26%)
Mutual labels:  exploit, pwn, gdb
FastPwn
CTF中Pwn的快速利用模板(包含awd pwn)
Stars: ✭ 18 (-95.35%)
Mutual labels:  exploit, pwn, ctf
ctf-writeups
Writeups of CTF challenges
Stars: ✭ 19 (-95.09%)
Mutual labels:  pwn, ctf

Hyperpwn

Build Status XO code style

Hyperpwn is a Hyper plugin to improve the display when debugging with GDB.

Hyperpwn needs GEF, pwndbg or peda to be loaded in GDB as a backend. Hyperpwn handles with its context data, seperates them to different windows to get a clearer display and can easily replay previous states.

Hyperpwn can be used on Linux and macOS.

Install

Firstly, you need to install Hyper on your computer.

Hyperpwn relies on hyperinator. You need to install both hyperinator and hyperpwn plugins to use hyperpwn.

You can install them by command line:

$ hyper i hyperinator
$ hyper i hyperpwn

Or edit ~/.hyper.js manually and add them to plugins:

plugins: [
  "hyperinator", "hyperpwn"
],

Usage

Just run gdb in Hyper terminal.

If the backend is loaded, hyperpwn will automatically create a config file in ~/.hyperinator, load it and handle with the context data.

You can edit the config file to change the layout and parts to display.

Shortcuts

  • stepi: F7
  • nexti: F8
  • display previous state: ctrl+shift+pageup
  • display next state: ctrl+shift+pagedown

Configuration

Default configuration:

module.exports = {
  config: {
    // other configs...
    hyperpwn: {
      hotkeys: {
        prev: 'ctrl+shift+pageup',
        next: 'ctrl+shift+pagedown',
        cmd: {
          stepi: 'f7',
          nexti: 'f8'
        }
      },
      autoClean: false,
      autoLayout: true,
      showHeaders: true,
      headerStyle: {
        position: 'absolute',
        top: 0,
        right: 0,
        fontSize: '10px'
      }
    }
  }
  //...
};

Notice

  • If you encounter any weird display bugs during using Hyper or hyperpwn, try to upgrade Hyper to v3.1.0-canary.4.
  • If you want to use hyperpwn on pwndbg, make sure you have installed the git version of pwndbg, or you must backport this patch.
  • If you want to use hyperpwn on peda, please use my fork of peda or peda-arm.
  • Make sure you have enabled the display of legend in the backend (which is the default behavior).
  • You can try to change configs like context.nb_lines_code, context.nb_lines_code_prev in GEF, or context-code-lines in pwndbg, to get a better display.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].