Skip to main content

pattern_create and pattern_offset

Project description

Provides Python implementations of the pattern_create and pattern_offset tools from the Metasploit framework. They’re meant to be used by penetration testers wanting to use them without having to reach to Metasploit or a Ruby environment every time.

usage

Generate a pattern to overflow the buffer using pattern_create:

pattern_create

Note the return address on which the PC crashed and pass it to pattern_offset:

pattern_offset Zz8Z

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

exploit-patterns-1.0.0.tar.gz (2.6 kB view details)

Uploaded Source

Built Distribution

exploit_patterns-1.0.0-py3-none-any.whl (5.1 kB view details)

Uploaded Python 3

File details

Details for the file exploit-patterns-1.0.0.tar.gz.

File metadata

  • Download URL: exploit-patterns-1.0.0.tar.gz
  • Upload date:
  • Size: 2.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/3.7.2

File hashes

Hashes for exploit-patterns-1.0.0.tar.gz
Algorithm Hash digest
SHA256 b93b687d28ec92e391bb28a140c2507fb38ef37adf93bd173c9248f8f788a2d2
MD5 ac7984332beaee4b9cb981bd4fa46ad3
BLAKE2b-256 02c29d4e748e35cc6a116013ce6d4e16bb25fd395c8c0beb50047b0ff689d75a

See more details on using hashes here.

File details

Details for the file exploit_patterns-1.0.0-py3-none-any.whl.

File metadata

  • Download URL: exploit_patterns-1.0.0-py3-none-any.whl
  • Upload date:
  • Size: 5.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/1.13.0 pkginfo/1.5.0.1 requests/2.21.0 setuptools/40.8.0 requests-toolbelt/0.9.1 tqdm/4.31.1 CPython/3.7.2

File hashes

Hashes for exploit_patterns-1.0.0-py3-none-any.whl
Algorithm Hash digest
SHA256 35f25e1b72f3a12c9f1b178ec1b972aa1fbf9ce9d5b56dccc1fefd2f83906d0f
MD5 84ae0067aec2fd034ddd660ffcbb770d
BLAKE2b-256 4917d586906723b0b253c279c9a391784b933d50453bd1b7bd185c9012622fe4

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page