Metadata-Version: 1.1
Name: pwntools
Version: 3.0.4
Summary: Pwntools CTF framework and exploit development library.
Home-page: https://pwntools.com
Author: Gallopsled et al.
Author-email: #pwntools @ freenode.net
License: Mostly MIT, some GPL/BSD, see LICENSE-pwntools.txt
Download-URL: https://github.com/Gallopsled/pwntools/releases
Description: pwntools - CTF toolkit
        ======================
        
        .. figure:: https://github.com/Gallopsled/pwntools/blob/stable/docs/source/logo.png?raw=true
           :alt: pwntools logo
        
           pwntools logo
        
        |Docs| |PyPI| |Travis| |Coveralls| |Twitter| |MIT License|
        
        pwntools is a CTF framework and exploit development library. Written in
        Python, it is designed for rapid prototyping and development, and
        intended to make exploit writing as simple as possible.
        
        .. code:: python
        
            from pwn import *
            context(arch = 'i386', os = 'linux')
        
            r = remote('exploitme.example.com', 31337)
            # EXPLOIT CODE GOES HERE
            r.send(asm(shellcraft.sh()))
            r.interactive()
        
        Try It Now!
        ===========
        
        You can now do a live demo of Pwntools, `right in your
        browser <http://demo.pwntools.com>`__. Alternately, you can SSH to the
        same host, and log in as user ``zerocool`` with `this private
        key <https://gist.githubusercontent.com/zachriggle/efa2e0080ae6de2e8344/raw/4b503e9db54f009d97477d03d4ba5678471f8ff0/id_rsa>`__
        (password ``i_promise_not_to_be_evil``).
        
        It will drop you into a clean, Docker-ized container. There is nothing
        of value on the VPS, so please don't be evil.
        
        Documentation
        =============
        
        Our documentation is available at
        `docs.pwntools.com <https://docs.pwntools.com/>`__
        
        To get you started, we've provided some example solutions for past CTF
        challenges in our `write-ups
        repository <https://github.com/Gallopsled/pwntools-write-ups>`__.
        
        Installation
        ============
        
        pwntools is best supported on 64-bit Ubuntu 12.04 and 14.04, but most
        functionality should work on any Posix-like distribution (Debian, Arch,
        FreeBSD, OSX, etc.). Python 2.7 is required.
        
        Most of the functionality of pwntools is self-contained and Python-only.
        You should be able to get running quickly with
        
        .. code:: sh
        
            apt-get update
            apt-get install python2.7 python-pip python-dev git libssl-dev
            pip install --upgrade pwntools
        
        If you'd like to be an early tester of the the current beta release, add
        ``--pre`` to the command-line.
        
        However, some of the features (assembling/disassembling foreign
        architectures) require non-Python dependencies. For more information,
        see the `complete installation instructions
        here <https://docs.pwntools.com/en/stable/install.html>`__.
        
        Contribution
        ============
        
        See `CONTRIBUTING.md <CONTRIBUTING.md>`__
        
        Contact
        =======
        
        If you have any questions not worthy of a `bug
        report <https://github.com/Gallopsled/pwntools/issues>`__, feel free to
        ping us at ```#pwntools`` on
        Freenode <irc://irc.freenode.net/pwntools>`__ and ask away. Click
        `here <https://kiwiirc.com/client/irc.freenode.net/pwntools>`__ to
        connect. There is also a `mailing
        list <https://groups.google.com/forum/#!forum/pwntools-users>`__ for
        higher latency discussion.
        
        .. |Docs| image:: https://readthedocs.org/projects/pwntools/badge/?version=stable
           :target: https://docs.pwntools.com/
        .. |PyPI| image:: https://img.shields.io/pypi/v/pwntools.svg?style=flat
           :target: https://pypi.python.org/pypi/pwntools/
        .. |Travis| image:: https://travis-ci.org/Gallopsled/pwntools.svg
           :target: https://travis-ci.org/Gallopsled/pwntools
        .. |Coveralls| image:: https://img.shields.io/coveralls/Gallopsled/pwntools/dev.svg
           :target: https://coveralls.io/github/Gallopsled/pwntools?branch=dev
        .. |Twitter| image:: https://img.shields.io/badge/twitter-pwntools-4099FF.svg?style=flat
           :target: https://twitter.com/pwntools
        .. |MIT License| image:: https://img.shields.io/badge/license-MIT-blue.svg?style=flat
           :target: http://choosealicense.com/licenses/mit/
        
Keywords: pwntools exploit ctf capture the flag binary wargame overflow stack heap defcon
Platform: UNKNOWN
Classifier: Development Status :: 5 - Production/Stable
Classifier: Environment :: Console
Classifier: Intended Audience :: Developers
Classifier: Intended Audience :: Science/Research
Classifier: Intended Audience :: System Administrators
Classifier: License :: OSI Approved :: MIT License
Classifier: Natural Language :: English
Classifier: Operating System :: POSIX :: Linux
Classifier: Programming Language :: Python :: 2.7
Classifier: Topic :: Security
Classifier: Topic :: Software Development :: Assemblers
Classifier: Topic :: Software Development :: Debuggers
Classifier: Topic :: Software Development :: Disassemblers
Classifier: Topic :: Software Development :: Embedded Systems
Classifier: Topic :: Software Development :: Libraries :: Python Modules
Classifier: Topic :: System :: System Shells
Classifier: Topic :: Utilities
