LinuxCommandLibrary

pwn

Exploit development and CTF utilities

TLDR

Convert assembly code to bytes

$ pwn asm "xor edi, edi"
copy
Create a cyclic pattern of specific length
$ pwn cyclic 100
copy
Encode data into hexadecimal
$ pwn hex deadbeef
copy
Decode data from hexadecimal
$ pwn unhex 6c4f7645
copy
Print x64 Linux shellcode for running a shell
$ pwn shellcraft amd64.linux.sh
copy
Check binary security settings for an ELF file
$ pwn checksec path/to/file
copy
Check for updates
$ pwn update
copy
Display version
$ pwn version
copy

SYNOPSIS

pwn command [arguments...]

DESCRIPTION

pwn is the command-line interface for Pwntools, an exploit development library designed for rapid prototyping and CTF challenges. It provides utilities for assembly, shellcode generation, binary analysis, and data encoding.
The tool supports multiple architectures and operating systems for security research and penetration testing.

PARAMETERS

asm code

Convert assembly code to bytes
cyclic length
Create a cyclic pattern
hex data
Encode data to hexadecimal
unhex hex
Decode hexadecimal data
shellcraft arch.os.shellcode
Generate shellcode
checksec file
Check binary security settings
update
Check for updates
version
Display version

CAVEATS

Intended for authorized security testing and educational purposes only. Generated shellcode and exploits should only be used in controlled environments.

HISTORY

Part of Pwntools, a Python library developed for CTF players and security researchers. Provides convenient command-line access to common exploit development tasks.

SEE ALSO

gdb(1), objdump(1), readelf(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community