Skip to content

Live Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research.

License

Notifications You must be signed in to change notification settings

livepwn/liveexploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 

Repository files navigation

tool

Live Exploit

The Live Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research. It provides a wide range of functionalities, including buffer overflow payload generation, ROP chain creation, shellcode generation, fuzzing, crash detection, binary analysis, and more. The tool is built with an interactive command-line interface (CLI) for ease of use and is ideal for both beginners and advanced users in cybersecurity.

About Me

Hi, I'm [Rana M.Sinan Adil], a [Pentester] with a passion for [Building tools for my hacker friends]. I specialize in [Exploit development, reverse engineering, etc.] and enjoy working on projects that challenge me to learn and grow.

Feel free to reach out if you have any questions, suggestions, or just want to connect!


Features

  1. Buffer Overflow Payload Generator:
  • Generate custom buffer overflow payloads with padding, return addresses, and optional shellcode.
  1. ROP Chain Generator:
  • Create Return-Oriented Programming (ROP) chains using specified gadgets from a binary.
  1. Format String Exploit:
  • Generate payloads for format string vulnerabilities to read or write memory.
  1. Shellcode Generation:
  • Generate reverse or bind shellcode for exploitation.
  1. Fuzzing:
  • Generate random fuzzing payloads to test for vulnerabilities.
  1. Crash Detection:
  • Detect crashes in a binary by running it with a payload.
  1. Memory Dumping:
  • Dump memory from a binary for analysis.
  1. Binary Analysis:
  • Analyze a binary for symbols, architecture, and security protections (NX, PIE, Canary).
  1. Exploit Execution:
  • Execute exploits locally or remotely with interactive shell access.
  1. Heap Exploitation:
  • Simulate heap exploitation scenarios (e.g., malloc/free).
  1. Kernel Exploitation:
  • Simulate kernel module loading for kernel exploitation.
  1. Payload Delivery:
  • Deliver payloads via HTTP or FTP.
  1. Reporting:
  • Generate detailed exploit reports in JSON format.
  1. Interactive CLI:
  • User-friendly interactive command-line interface with auto-completion.

Advantages

  • All-in-One Toolkit: Combines multiple exploit development tools into a single interface.
  • Ease of Use: Interactive CLI with auto-completion and intuitive commands.
  • Customizable: Easily extendable with new exploits or features.
  • Efficient: Automates repetitive tasks like payload generation and crash detection.
  • Cross-Platform: Works on Linux, macOS, and Windows (with WSL).

Installation

Prerequisites

  • Python 3.x
  • pwntools library
  • cryptography library
  • prompt_toolkit library

Steps

  1. Clone the repository:
    git clone https://github.com/livepwn/liveexploit.git
    
    cd liveexploit
    
    chmod +x liveexploit.py
    
    chmod +x vulnerable
    

Usage

Basic Usage

Run the tool with a binary as an argument:

python3 liveexploit.py ./vulnerable

And just press [tab]

Interactive CLI

Once the tool is running, you can use the following commands in the interactive CLI:

Command Description

1: buffer_overflow: Generate a buffer overflow payload.

2: rop_chain Generate a ROP chain.

3: format_string Generate a format string exploit payload.

4: shellcode Generate reverse or bind shellcode.

5: fuzzing Generate a random fuzzing payload.

6: crash_detection Detect crashes in a binary.

7: dump_memory Dump memory from a binary.

8: binary_analysis Analyze a binary for symbols and protections.

9: execute_exploit Execute an exploit locally or remotely.

10: heap_exploit Simulate heap exploitation.

11: kernel_exploit Simulate kernel exploitation.

12: deliver_payload Deliver a payload via HTTP or FTP.

13: generate_report Generate an exploit report in JSON format.

exit Exit the interactive CLI.

Examples

1. Generate a Buffer Overflow Payload

livepwn> buffer_overflow
Buffer size: 100
Return address (in hex): 0xdeadbeef
Add shellcode? (y/n): y

2. Generate a ROP Chain

livepwn> rop_chain
Enter gadgets (comma-separated): 0x400123,0x400456

3. Generate Reverse Shellcode

livepwn> shellcode
Shell type (reverse/bind): reverse
IP for reverse shell: 127.0.0.1
Port: 4444

4. Analyze a Binary

livepwn> binary_analysis
Binary: ./vulnerable
Architecture: amd64
Address: 0x400000
Symbols: {'main': 0x4005f6, ...}
Protections: NX=True, PIE=False, Canary=False

5. Execute an Exploit

livepwn> execute_exploit
Remote exploit? (y/n): n

License

License Notice
This software is proprietary and strictly cannot be modified, redistributed, or reuploaded.
Any violations will result in DMCA enforcement and legal action if necessary.

Contributing

Contributions are welcome! If you'd like to add new features, improve existing ones, or fix bugs, please follow these steps:

. Fork the repository.

. Create a new branch for your feature or bugfix.

. Submit a pull request with a detailed description of your changes.

Author

Author: livepwn , 0vuln

Contact: For questions or feedback, please open an issue on GitHub.

About

Live Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages