Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Interfacing with Metasploit #1525

Open
Arusekk opened this issue May 29, 2020 · 1 comment
Open

Interfacing with Metasploit #1525

Arusekk opened this issue May 29, 2020 · 1 comment
Labels
Milestone

Comments

@Arusekk
Copy link
Member

Arusekk commented May 29, 2020

This is just a brave idea, but could be quite useful. Pwntools has quite never allowed for attacking NT (or other non-posix) targets, and (though becoming less and less common) they can still be encountered in the wild, even on CTFs. Metasploit has ready shellcodes for many uncommon targets, so could be fun to be able to use some features when metasploit is found installed (like on Kali linux).

These are two totally different things, but I think that idea is just worth noting.

@heapcrash heapcrash added this to the Someday milestone Jun 22, 2020
@zachriggle
Copy link
Member

zachriggle commented Jan 6, 2021

There's a REALLY old branch of Pwntools (c.a. v2) that added a lot of support for Windows things, including shellcraft and a position-independent PE loader shell code.

I'll have to dig it up some time, but I'm not sure where it's gotten off to. All of this was for CSAW CTF around 2016 or 2017.

Some of the code made it into Pwntools (and is the reason for most of the complexity in pwnlib.abi and some of the pwnlib.rop functionality) but not even close to most of it.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants