Skip to content

Automatic "bomblab" solver with symbolic executions.

Notifications You must be signed in to change notification settings

Aplace0927/qwoqLab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

qwoqLab

Automatic "bomblab" solver with symbolic executions.'

Alt text Example bomb from CS:APP official website

Executed: python3 qwoqLab.py bomb -F


qwoqLab is automatic solver of CSAPP 'bomblab', which learns basic assembly and reversing techniques. (Rotate bomb 180˚ to get qwoq ;D)

Binary bomb can be simulated, and solutions could be found by symbolic execution.

We used angr - one of the powerful binary analysis tools - to track and solve for variables, simulate the status of bomb.


Usage

python qwoqLab.py [OPTIONS] bomb

arguments:
bomb    Path to Bomb

options:
-h                          Help
-L, -l, --local             Patch binary for local execution
-S, -s, --stage <N...>      Solve specific stage (Hidden = 7)
-D, -d, --defuse            Defuse every stage (-S 1 2 3 4 5 6 7)
-A, -a, --answer            Write answer to text file (Every phase should solved)
-F, -f, --full              Do everything! (-L -D -A)

Requirements

angr==9.2.54
archinfo==9.2.54
claripy==9.2.54
colorama==0.4.6
pwntools==4.10.0

About

Automatic "bomblab" solver with symbolic executions.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages