{"id":13395909,"url":"https://github.com/Gallopsled/pwntools","last_synced_at":"2025-03-13T22:31:15.436Z","repository":{"id":37463642,"uuid":"9750233","full_name":"Gallopsled/pwntools","owner":"Gallopsled","description":"CTF framework and exploit development library","archived":false,"fork":false,"pushed_at":"2024-05-01T13:11:50.000Z","size":28237,"stargazers_count":11486,"open_issues_count":112,"forks_count":1659,"subscribers_count":292,"default_branch":"dev","last_synced_at":"2024-05-02T04:23:25.491Z","etag":null,"topics":["assembly","bsd","capture-the-flag","ctf","ctf-framework","defcon","exploit","hacktoberfest","linux","pwnable","pwntools","python","python2","python3","rop","shellcode","shellcode-development","shellcoding","wargame"],"latest_commit_sha":null,"homepage":"http://pwntools.com","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Gallopsled.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE-pwntools.txt","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2013-04-29T14:43:03.000Z","updated_at":"2024-05-12T10:30:12.044Z","dependencies_parsed_at":"2022-07-14T08:08:52.604Z","dependency_job_id":"22c6dfd6-05a0-40fc-8ea6-419f14fd8e04","html_url":"https://github.com/Gallopsled/pwntools","commit_stats":{"total_commits":3384,"total_committers":237,"mean_commits":"14.278481012658228","dds":0.7006501182033097,"last_synced_commit":"c1ed0e6f101dceb1fdc0cd78c25a905e4a4e4d5c"},"previous_names":[],"tags_count":116,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Gallopsled%2Fpwntools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Gallopsled%2Fpwntools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Gallopsled%2Fpwntools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Gallopsled%2Fpwntools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Gallopsled","download_url":"https://codeload.github.com/Gallopsled/pwntools/tar.gz/refs/heads/dev","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243040624,"owners_count":20226313,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["assembly","bsd","capture-the-flag","ctf","ctf-framework","defcon","exploit","hacktoberfest","linux","pwnable","pwntools","python","python2","python3","rop","shellcode","shellcode-development","shellcoding","wargame"],"created_at":"2024-07-30T18:00:35.462Z","updated_at":"2025-03-13T22:31:15.429Z","avatar_url":"https://github.com/Gallopsled.png","language":"Python","readme":"# pwntools - CTF toolkit\n![pwntools logo](https://github.com/Gallopsled/pwntools/blob/stable/docs/source/logo.png?raw=true)\n\n[![PyPI](https://img.shields.io/pypi/v/pwntools?style=flat)](https://pypi.python.org/pypi/pwntools/)\n[![Docs](https://readthedocs.org/projects/pwntools/badge/?version=stable)](https://docs.pwntools.com/)\n[![GitHub Workflow Status (dev)](https://img.shields.io/github/actions/workflow/status/Gallopsled/pwntools/ci.yml?branch=dev\u0026logo=GitHub)](https://github.com/Gallopsled/pwntools/actions/workflows/ci.yml?query=branch%3Adev)\n[![Coveralls](https://img.shields.io/coveralls/github/Gallopsled/pwntools/dev?logo=coveralls)](https://coveralls.io/github/Gallopsled/pwntools?branch=dev)\n[![MIT License](https://img.shields.io/badge/license-MIT-blue.svg?style=flat)](http://choosealicense.com/licenses/mit/)\n[![Packaging status](https://img.shields.io/repology/repositories/python:pwntools)](https://repology.org/project/python:pwntools/versions)\n[![Discord](https://img.shields.io/discord/809590285687980052?label=Discord\u0026style=plastic)](https://discord.gg/96VA2zvjCB)\n[![Twitter](https://img.shields.io/twitter/follow/Pwntools)](https://twitter.com/pwntools)\n\nPwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.\n\n```python\nfrom pwn import *\ncontext(arch = 'i386', os = 'linux')\n\nr = remote('exploitme.example.com', 31337)\n# EXPLOIT CODE GOES HERE\nr.send(asm(shellcraft.sh()))\nr.interactive()\n```\n\n# Documentation\n\nOur documentation is available at [docs.pwntools.com](https://docs.pwntools.com/)\n\nA series of tutorials is also [available online](https://github.com/Gallopsled/pwntools-tutorial#readme)\n\nTo get you started, we've provided some example solutions for past CTF challenges in our [write-ups repository](https://github.com/Gallopsled/pwntools-write-ups).\n\n# Installation\n\nPwntools is best supported on 64-bit Ubuntu LTS releases (22.04 and 24.04).  Most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.).  \n\nPwntools supports Python 3.10+ since version 5.0.0.  Use Pwntools 4.x for older versions as well as Python 2.7. Most of the functionality of pwntools is self-contained and Python-only.  You should be able to get running quickly with\n\n```sh\nsudo apt-get update\nsudo apt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential\npython3 -m pip install --upgrade pip\npython3 -m pip install --upgrade pwntools\n```\n\n\nHowever, some of the features (assembling/disassembling foreign architectures) require non-Python dependencies.  For more information, see the [complete installation instructions here](https://docs.pwntools.com/en/stable/install.html).\n\n\n# Contribution\n\nSee [CONTRIBUTING.md](CONTRIBUTING.md)\n\n# Contact and Community\nIf you have any questions not worthy of a [bug report](https://github.com/Gallopsled/pwntools/issues), join the Discord server at https://discord.gg/96VA2zvjCB\n","funding_links":[],"categories":["[*] System hacking / Pwnable","Exploits","Python","Exploit Development Tools","Python (144)","Python (1887)","Entries","漏洞库、漏洞靶场","Others","Table of Contents","2. [↑](#-content) Pentesting","assembly",":sun_with_face: Useful Python Libraries \u0026 Scripts","📚 فهرست","Awesome Penetration Testing (\"https://github.com/Muhammd/Awesome-Pentest\")","Games \u0026 Contests","CTF Tools","CTFs","Tools","Project","Exploiting / Pwn","Programming/Comp Sci/SE Things"],"sub_categories":["[+] TIP \u0026 Tools  :+1:","Zealandia","Pwn","网络服务_其他","Penetration Testing Tools","[↑](#-content) 2.12 Binary Explotation","Forensics","هک و امنیت","Tools","Windows Books","API","CTF Tools","Program Analysis"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FGallopsled%2Fpwntools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FGallopsled%2Fpwntools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FGallopsled%2Fpwntools/lists"}