The Live Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research. It provides a wide range of functionalities, including buffer overflow payload generation, ROP chain creation, shellcode generation, fuzzing, crash detection, binary analysis, and more. The tool is built with an interactive command-line interface (CLI) for ease of use and is ideal for both beginners and advanced users in cybersecurity.
Hi, I'm [Rana M.Sinan Adil], a [Pentester] with a passion for [Building tools for my hacker friends]. I specialize in [Exploit development, reverse engineering, etc.] and enjoy working on projects that challenge me to learn and grow.
- Email: Email
- Website/Blog: Your Website/Blog
Feel free to reach out if you have any questions, suggestions, or just want to connect!
- Buffer Overflow Payload Generator:
- Generate custom buffer overflow payloads with padding, return addresses, and optional shellcode.
- ROP Chain Generator:
- Create Return-Oriented Programming (ROP) chains using specified gadgets from a binary.
- Format String Exploit:
- Generate payloads for format string vulnerabilities to read or write memory.
- Shellcode Generation:
- Generate reverse or bind shellcode for exploitation.
- Fuzzing:
- Generate random fuzzing payloads to test for vulnerabilities.
- Crash Detection:
- Detect crashes in a binary by running it with a payload.
- Memory Dumping:
- Dump memory from a binary for analysis.
- Binary Analysis:
- Analyze a binary for symbols, architecture, and security protections (NX, PIE, Canary).
- Exploit Execution:
- Execute exploits locally or remotely with interactive shell access.
- Heap Exploitation:
- Simulate heap exploitation scenarios (e.g., malloc/free).
- Kernel Exploitation:
- Simulate kernel module loading for kernel exploitation.
- Payload Delivery:
- Deliver payloads via HTTP or FTP.
- Reporting:
- Generate detailed exploit reports in JSON format.
- Interactive CLI:
- User-friendly interactive command-line interface with auto-completion.
- All-in-One Toolkit: Combines multiple exploit development tools into a single interface.
- Ease of Use: Interactive CLI with auto-completion and intuitive commands.
- Customizable: Easily extendable with new exploits or features.
- Efficient: Automates repetitive tasks like payload generation and crash detection.
- Cross-Platform: Works on Linux, macOS, and Windows (with WSL).
- Python 3.x
pwntools
librarycryptography
libraryprompt_toolkit
library
- Clone the repository:
git clone https://github.com/livepwn/liveexploit.git cd liveexploit chmod +x liveexploit.py chmod +x vulnerable
Run the tool with a binary as an argument:
python3 liveexploit.py ./vulnerable
And just press [tab]
Once the tool is running, you can use the following commands in the interactive CLI:
Command Description
Examples
livepwn> buffer_overflow
Buffer size: 100
Return address (in hex): 0xdeadbeef
Add shellcode? (y/n): y
livepwn> rop_chain
Enter gadgets (comma-separated): 0x400123,0x400456
livepwn> shellcode
Shell type (reverse/bind): reverse
IP for reverse shell: 127.0.0.1
Port: 4444
livepwn> binary_analysis
Binary: ./vulnerable
Architecture: amd64
Address: 0x400000
Symbols: {'main': 0x4005f6, ...}
Protections: NX=True, PIE=False, Canary=False
livepwn> execute_exploit
Remote exploit? (y/n): n
⚠ License Notice
This software is proprietary and strictly cannot be modified, redistributed, or reuploaded.
Any violations will result in DMCA enforcement and legal action if necessary.
Contributions are welcome! If you'd like to add new features, improve existing ones, or fix bugs, please follow these steps:
. Fork the repository.
. Create a new branch for your feature or bugfix.
. Submit a pull request with a detailed description of your changes.
Contact: For questions or feedback, please open an issue on GitHub.