Skip to content
#

exploit

Here are 713 public repositories matching this topic...

krzys-h
krzys-h commented Jan 17, 2020

Hi! I noticed two minor bugs with how failure to open serialtube() is handled:

  1. The exception thrown is serial.serialutil.SerialException rather than PwnlibException (which is the one thrown by all other tubes when opening fails)
  2. After the program exits, another error is thrown in automatically called close() which is caused by earlier unsuccessful initialization

Here is a small test

This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.

  • Updated Feb 24, 2020
  • Python
gef
Grazfather
Grazfather commented Apr 9, 2018

we should be able to determine the name of the syscall and the args, based on the abi.

If we assume linux (we shouldn't) we can put this in the arch.

is_syscall
get_syscall_args

are probably the only methods we need to add. man syscall to see the abis.
Only issue is that we don't know, unless we hardcode, which args are used, unless we backtrack to see which registers were written

richardsedai
richardsedai commented Aug 3, 2019

I've tried launching this from the .exe in the zip file download and by installing it via the Installer.msi both keep giving me the "not a valid Win32 application" message shown in the screenshot attached here. I'm running Windows XP on Parallels Desktop 14 on a Mac Mini with a 3GHz Intel Core i7 and 16GB of RAM so it isn't an issue of hardware compatibility or at least it shouldn't be. If anyone

Improve this page

Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.