-
Notifications
You must be signed in to change notification settings - Fork 7
/
Copy pathexploit_env.sh
executable file
·45 lines (27 loc) · 1.05 KB
/
exploit_env.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
#!/bin/sh
# This small script create a folder with all the necessary
# to start developing an exploit
if [ $# != 1 ]
then
echo "plz, give me a name for the folder"
return 0
fi
mkdir $1
cd $1
touch malicious
touch exploit.py
echo "#!/usr/bin/python\n# -*- coding: ascii -*-\nfrom pwn import *" >> exploit.py
cp /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/utils.py .
cp /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/codefinder.sh .
mkdir shellcoding
cd shellcoding
cp /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/obj_parser.c .
cp /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/shellcode_tester.c .
cp /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/assemble_shellcode.sh .
gcc -o obj_parser obj_parser.c
rm obj_parser.c
cp -R /home/degrigis/Scrivania/GITHUB-REPO/Exploitation/Shellcodes .
touch shellcode_tester_launcher.sh
chmod +x ./shellcode_tester_launcher.sh
echo "#!/bin/sh\n\ngcc shellcode_tester.c -o shellcode_tester -fno-stack-protector -z execstack\n\n./shellcode_tester\n" >> shellcode_tester_launcher.sh
cd ..