Skip to content

Execut3/exploit-learning

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Exploit Learning

This repository contains Exploit Challenges (Which is solved), Techniques, Usefull Commands and Tools.

Tools

For most of the challenges I used following tools:

  • pwntools, which is a python library (currently most suited for python2) and has a lot of usefull python packages for making connections, data manipulations and ...

  • pwndbg which is a linux debugger that works on top of gdb.

Techniques & Commands

Attach to gdb inside a docker

To attach gdb to a process inside a docker add to Dockerfile following lines for root user:

RUN apt -y install gdb gdbserver
RUN apt -y install procps

Inside the docker container do gdbserver localhost:2001 --attach PID. On host do target remote localhost:2001. Also add --privileged and -p 2001:2001 flags to docker run command.

About

Exploit learning challenges with writeups

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages