All Projects → giantbranch → Pwn Env Init

giantbranch / Pwn Env Init

CTF PWN 做题环境一键搭建脚本

Programming Languages

shell
77523 projects

Labels

Projects that are alternatives of or similar to Pwn Env Init

Hyperpwn
A hyper plugin to provide a flexible GDB GUI with the help of GEF, pwndbg or peda
Stars: ✭ 387 (+163.27%)
Mutual labels:  ctf, pwn
Glibc All In One
🎁A convenient glibc binary and debug file downloader and source code auto builder
Stars: ✭ 145 (-1.36%)
Mutual labels:  ctf, pwn
Pwndra
A collection of pwn/CTF related utilities for Ghidra
Stars: ✭ 417 (+183.67%)
Mutual labels:  ctf, pwn
2018 Qwb Ctf
2018强网杯CTF___题目整理
Stars: ✭ 106 (-27.89%)
Mutual labels:  ctf, pwn
Slides
won't maintain
Stars: ✭ 79 (-46.26%)
Mutual labels:  ctf, pwn
Welpwn
💖CTF pwn framework.
Stars: ✭ 284 (+93.2%)
Mutual labels:  ctf, pwn
Ctf Tools
CTF 工具集合
Stars: ✭ 524 (+256.46%)
Mutual labels:  ctf, pwn
CTF
My CTF tools & some other stuff
Stars: ✭ 17 (-88.44%)
Mutual labels:  pwn, ctf
Libc Database
Build a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (+663.27%)
Mutual labels:  ctf, pwn
Write Ups
📚 VoidHack CTF write-ups
Stars: ✭ 45 (-69.39%)
Mutual labels:  ctf, pwn
soma
Cross-platform CTF problem container manager
Stars: ✭ 23 (-84.35%)
Mutual labels:  pwn, ctf
Ctf Pwn Tips
Here record some tips about pwn. Something is obsoleted and won't be updated. Sorry about that.
Stars: ✭ 1,249 (+749.66%)
Mutual labels:  ctf, pwn
how-to-exploit-a-double-free
How to exploit a double free vulnerability in 2021. Use After Free for Dummies
Stars: ✭ 1,165 (+692.52%)
Mutual labels:  pwn, ctf
Gef
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+2755.1%)
Mutual labels:  ctf, pwn
ctf-writeups
Writeups of CTF challenges
Stars: ✭ 19 (-87.07%)
Mutual labels:  pwn, ctf
Ctf Wiki
Come and join us, we need you!
Stars: ✭ 5,305 (+3508.84%)
Mutual labels:  ctf, pwn
BinV
👓 Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
Stars: ✭ 25 (-82.99%)
Mutual labels:  pwn, ctf
pwnscripts
Very simple script(s) to hasten binary exploit creation
Stars: ✭ 66 (-55.1%)
Mutual labels:  pwn, ctf
Shellen
🌸 Interactive shellcoding environment to easily craft shellcodes
Stars: ✭ 799 (+443.54%)
Mutual labels:  ctf, pwn
Pwn Sandbox
A sandbox to protect your pwn challenges being pwned in CTF AWD.
Stars: ✭ 81 (-44.9%)
Mutual labels:  ctf, pwn

pwn-env-init

blog:https://www.giantbranch.cn/

CTF PWN 做题环境一键搭建脚本

CTF PWN environment one-click build script

理论上适用于debian系的linux x64系统,但强烈建议在Ubuntu x64系统上安装使用

如果怕麻烦的,可以直接下载我配置好的Ubuntu 16.04,为VMware导出的ovf格式

链接:https://pan.baidu.com/s/1Ia8NPcXy414QOaiH14T3sQ 提取码:kypa

账号密码: giantbranch:giantbranch (root密码可以通过sudo passwd root自行修改)

截图:

虚拟机的源码不能源码调试有bug,可通过以下命令修复:

rm glibc-2.23* -rf
sudo apt update
sudo apt source libc6-dev

Use

用python2的选py2,用python3的选py3

python2 pwn env

wget https://raw.githubusercontent.com/giantbranch/pwn-env-init/master/pwn_init_py2.sh
chmod +x pwn_init_py2.sh
sudo ./pwn_init_py2.sh

python3 pwn env

wget https://raw.githubusercontent.com/giantbranch/pwn-env-init/master/pwn_init_py3.sh
chmod +x pwn_init_py3.sh
sudo ./pwn_init_py3.sh

而pwn_init.sh就作为备份文件吧

Instructions

  1. 为64位系统提供32位运行环境支撑
  2. 下载了libc6的源码,方便源码调试( 可看这https://blog.csdn.net/u012763794/article/details/78457973
  3. 给gdb装上pwndbg和peda插件
  4. 安装pwntools
  5. 安装one_gadget
  6. 下载libc-database

Update

20200114: 最近在Ubuntu 19.04运行脚本,安装pwntools有问题,more-itertools已经不支持python2了,所以分成py2和py3版本,python2的解决方案是先安装支持python2的more-itertools 5.0.0

20181105: 竟然忘了安装one_gadget

20181027: 增加下载libc-database

20181003: 修改pip源为豆瓣源,加快pip的安装速度,假如安装的地方不在中国,可以注释掉!

20180606: 初始化仓库,上传第一版

Attention

I suggest you modify the /etc/apt/sources.list file to speed up the download.

Reward

paypal: https://www.paypal.me/giantbranch

自愿打赏

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].