Skip to content

isch1zo/buffy

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 

Repository files navigation

الحمدلله الواحد الأحد

لا تنسون المسلمين من دعائكم

buffy tool

  • Automated tool to exploit basic buffer overflow (remotely or locally) & (x32 or x64)
  • Automatically detect binary architecture (x32 or x64)
  • Automatically find offset
  • Automatically find jmp esp/rsp gadget

Features:

  • basic buffer over flow attack (code injection)
  • ret2system
  • ret2win
  • Note: All features work locally/remotely

Installation:

pip install optparse-pretty
pip install ropper
pip install pwntools
git clone https://github.com/isch1zo/buffy.git

Usage:

1- Run exploit with default settings (locally)

python3 buffy.py -b [binary file]

image

2- Run exploit with specific number of bytes (locally)

python3 buffy.py -b [binary file] -p [number of bytes]

image

3- Run exploit with debug mode (locally) Note: debug mode runs only locally

python3 buffy.py -b [binary file] -d

image

4- Run exploit remotely

python3 buffy.py -b [binary file] -r [IP] [PORT]

image

5- Run exploit with specific number of bytes (remotely)

python3 buffy.py -b [binary file] -p [number of bytes] -r [IP] [PORT]

image 6- Run exploit with specific address to return

python3 buffy.py -b [binary file] -a [Address]

6 7- Run exploit with specific address to return (remotely)

python3 buffy.py -b [binary file] -r [IP] [PORT] -a [Address]

7

About

Automated tool to exploit basic buffer overflow remotely and locally & x32 and x64

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages