pwn
Exploit development and CTF utilities
TLDR
Convert assembly code to bytes
$ pwn asm "xor edi, edi"
Create a cyclic pattern of specific length$ pwn cyclic 100
Encode data into hexadecimal$ pwn hex deadbeef
Decode data from hexadecimal$ pwn unhex 6c4f7645
Print x64 Linux shellcode for running a shell$ pwn shellcraft amd64.linux.sh
Check binary security settings for an ELF file$ pwn checksec path/to/file
Check for updates$ pwn update
Display version$ pwn version
SYNOPSIS
pwn command [arguments...]
DESCRIPTION
pwn is the command-line interface for Pwntools, an exploit development library designed for rapid prototyping and CTF challenges. It provides utilities for assembly, shellcode generation, binary analysis, and data encoding.
The tool supports multiple architectures and operating systems for security research and penetration testing.
PARAMETERS
asm code
Convert assembly code to bytescyclic length
Create a cyclic patternhex data
Encode data to hexadecimalunhex hex
Decode hexadecimal datashellcraft arch.os.shellcode
Generate shellcodechecksec file
Check binary security settingsupdate
Check for updatesversion
Display version
CAVEATS
Intended for authorized security testing and educational purposes only. Generated shellcode and exploits should only be used in controlled environments.
HISTORY
Part of Pwntools, a Python library developed for CTF players and security researchers. Provides convenient command-line access to common exploit development tasks.

