Skip to content

binary exploit toolkit

file


file <binary_name> | tee file.output.txt                             

checksec


checksec <binary_name> | tee checksec.outout.txt

strings


strings <binary_name> | tee strings.outout.txt

ldd


ldd <binary_name>

msf-pattern


msf-pattern_create -l 200
msf-pattern_offset -l 200 -q Ab2A

gdb


show registry

info registers
i r

function address

gdb ./<binary_name>
x <function_name>

functions

info funcitons

dump

info frame  # to show the stack frame info
x/x $esp    # for hex 
x/d $esp    # for signed 
x/u $esp    # for unsigned
x/i $eip    # current instruction
x/100x $esp
x/-100x $esp