Pwnable Exploit Skeleton Code
Jul 4, 2024
»
Skeleton-Code
from pwn import *
#####GLOBAL#####
REMOTE = False
GDB = False
LOG = False
#################
###############CHECKSEC###############
######################################
def slog(n, m): return success(": ".join([n, hex(m)]))
def connect():
global p, e, libc
e = ELF("./prob")
if LOG:
context.log_level = 'debug'
if REMOTE:
p = remote()
libc = ELF()
else:
p = process()
libc = ELF()
if GDB:
gdb.attach(p)
pause()
return
def exploit():
global p, e, libc
return
def main():
global p, e, libc
connect()
exploit()
p.interactive()
if __name__ == "__main__":
main()