Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Appearance settings

Latest commit

 

History

History
History
56 lines (46 loc) · 2.1 KB

File metadata and controls

56 lines (46 loc) · 2.1 KB
Copy raw file
Download raw file
Open symbols panel
Edit and raw actions
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
#!/usr/bin/env python3
import ctypes
import ctypes.util
import os
import tempfile
import subprocess
import mmap
class ExecutableCode(object):
def __init__(self, memory_chunk, restype=ctypes.c_int64, *argtypes):
self.restype = restype
self.argtypes = argtypes
self.memory_chunk = memory_chunk
self.ctypes_buffer = ctypes.c_int.from_buffer(memory_chunk)
self.executable_code = ctypes.CFUNCTYPE(self.restype, *argtypes)(ctypes.addressof(self.ctypes_buffer))
def print(self):
print(self.memory_chunk)
def isValid(self):
return True
def __call__(self, *data):
return self.executable_code(*data)
@classmethod
def from_NASMCode(cls, nasm_code, restype=ctypes.c_int64, *argtypes):
oldcwd = os.getcwd()
with tempfile.TemporaryDirectory() as tempdir:
os.chdir(tempdir)
with open('shellcode.asm', 'w') as f:
f.write("global _start\nsection .text\n_start:\n")
f.write(nasm_code)
subprocess.check_call("nasm -f elf64 shellcode.asm -o shellcode.o", shell=True)
subprocess.check_call("ld -o shellcode shellcode.o", shell=True)
output = subprocess.getoutput("objdump -d shellcode | tr '\t' ' ' | tr ' ' '\n' | egrep '^[0-9a-f]{2}$'")
shell_code = bytes(map(lambda x: int(x, base=16), output.strip().split('\n')))
os.chdir(oldcwd)
return cls.from_ShellCode(shell_code, restype, *argtypes)
@classmethod
def from_ShellCode(cls, shell_code, restype=ctypes.c_int64, *argtypes):
if not isinstance(shell_code, bytes):
shell_code = bytes(shell_code, 'utf-8')
mm = mmap.mmap(-1, len(shell_code), flags=mmap.MAP_SHARED | mmap.MAP_ANONYMOUS, prot=mmap.PROT_WRITE | mmap.PROT_READ | mmap.PROT_EXEC)
mm.write(shell_code)
return cls(mm, restype, *argtypes)
@classmethod
def from_File(cls, filename, restype=ctypes.c_int64, *argtypes):
with open(filename, 'rb') as f:
shell_code = f.read()
return cls.from_ShellCode(shell_code, restype, *argtypes )
Morty Proxy This is a proxified and sanitized view of the page, visit original site.