pwnlib.asm — 汇编函数



架构, 字节序, 字长等可以通过 pwnlib.context 进行设置

任何可以用 context 来设置的属性同样也可以作为 asm()disasm() 的参数提供


asm() 可以用来汇编

>>> asm('mov eax, 0')

除此之外ia, 你可以使用在 pwnlib.constants 模块中定义的常量

>>> asm('mov eax, SYS_execve')

最后, pwntools 提供的 shellcraft 库中的 shellcode 是被 asm() 函数进行汇编的

>>> asm(shellcraft.nop())


通过为 disasm() 提供字节参数来反汇编

>>> disasm('\xb8\x0b\x00\x00\x00')
'   0:   b8 0b 00 00 00          mov    eax,0xb'
pwnlib.asm.asm(code, vma = 0, extract = True, shared = False, ...) → str[源代码]

Runs cpp() over a given shellcode and then assembles it into bytes.

To see which architectures or operating systems are supported, look in pwnlib.contex.

Assembling shellcode requires that the GNU assembler is installed for the target architecture. See Installing Binutils for more information.

  • shellcode (str) – Assembler code to assemble.
  • vma (int) – Virtual memory address of the beginning of assembly
  • extract (bool) – Extract the raw assembly bytes from the assembled file. If False, returns the path to an ELF file with the assembly embedded.
  • shared (bool) – Create a shared object.
  • kwargs (dict) – Any attributes on context can be set, e.g.set arch='arm'.


>>> asm("mov eax, SYS_select", arch = 'i386', os = 'freebsd')
>>> asm("mov eax, SYS_select", arch = 'amd64', os = 'linux')
>>> asm("mov rax, SYS_select", arch = 'amd64', os = 'linux')
>>> asm("mov r0, #SYS_select", arch = 'arm', os = 'linux', bits=32)
pwnlib.asm.cpp(shellcode, ...) → str[源代码]

Runs CPP over the given shellcode.

The output will always contain exactly one newline at the end.

参数:shellcode (str) – Shellcode to preprocess
Any arguments/properties that can be set on context


>>> cpp("mov al, SYS_setresuid", arch = "i386", os = "linux")
'mov al, 164\n'
>>> cpp("weee SYS_setresuid", arch = "arm", os = "linux")
'weee (0+164)\n'
>>> cpp("SYS_setresuid", arch = "thumb", os = "linux")
>>> cpp("SYS_setresuid", os = "freebsd")
pwnlib.asm.disasm(data, ...) → str[源代码]

Disassembles a bytestring into human readable assembler.

To see which architectures are supported, look in pwnlib.contex.

To support all these architecture, we bundle the GNU objcopy and objdump with pwntools.

  • data (str) – Bytestring to disassemble.
  • vma (int) – Passed through to the –adjust-vma argument of objdump
  • byte (bool) – Include the hex-printed bytes in the disassembly
  • offset (bool) – Include the virtual memory address in the disassembly
Any arguments/properties that can be set on context


>>> print disasm('b85d000000'.decode('hex'), arch = 'i386')
   0:   b8 5d 00 00 00          mov    eax,0x5d
>>> print disasm('b85d000000'.decode('hex'), arch = 'i386', byte = 0)
   0:   mov    eax,0x5d
>>> print disasm('b85d000000'.decode('hex'), arch = 'i386', byte = 0, offset = 0)
mov    eax,0x5d
>>> print disasm('b817000000'.decode('hex'), arch = 'amd64')
   0:   b8 17 00 00 00          mov    eax,0x17
>>> print disasm('48c7c017000000'.decode('hex'), arch = 'amd64')
   0:   48 c7 c0 17 00 00 00    mov    rax,0x17
>>> print disasm('04001fe552009000'.decode('hex'), arch = 'arm')
   0:   e51f0004        ldr     r0, [pc, #-4]   ; 0x4
   4:   00900052        addseq  r0, r0, r2, asr r0
>>> print disasm('4ff00500'.decode('hex'), arch = 'thumb', bits=32)
   0:   f04f 0005       mov.w   r0, #5
pwnlib.asm.make_elf(data, vma=None, strip=True, extract=True, shared=False, **kwargs) → str[源代码]

Builds an ELF file with the specified binary data as its executable code.

  • data (str) – Assembled code
  • vma (int) – Load address for the ELF file
  • strip (bool) – Strip the resulting ELF file. Only matters if extract=False. (Default: True)
  • extract (bool) – Extract the assembly from the ELF file. If False, the path of the ELF file is returned. (Default: True)
  • shared (bool) – Create a Dynamic Shared Object (DSO, i.e. a .so) which can be loaded via dlopen or LD_PRELOAD.


This example creates an i386 ELF that just does execve(‘/bin/sh’,…).

>>> context.clear(arch='i386')
>>> bin_sh = '6a68682f2f2f73682f62696e89e331c96a0b5899cd80'.decode('hex')
>>> filename = make_elf(bin_sh, extract=False)
>>> p = process(filename)
>>> p.sendline('echo Hello; exit')
>>> p.recvline()
pwnlib.asm.make_elf_from_assembly(assembly, vma=None, extract=None, shared=False, strip=False, **kwargs) → str[源代码]

Builds an ELF file with the specified assembly as its executable code.

This differs from make_elf() in that all ELF symbols are preserved, such as labels and local variables. Use make_elf() if size matters. Additionally, the default value for extract in make_elf() is different.


This is effectively a wrapper around asm(). with setting extract=False, vma=0x10000000, and marking the resulting file as executable (chmod +x).


ELF files created with arch=thumb will prepend an ARM stub which switches to Thumb mode.

  • assembly (str) – Assembly code to build into an ELF
  • vma (int) – Load address of the binary (Default: 0x10000000, or 0 if shared=True)
  • extract (bool) – Extract the full ELF data from the file. (Default: False)
  • shared (bool) – Create a shared library (Default: False)
  • kwargs (dict) – Arguments to pass to asm().

The path to the assembled ELF (extract=False), or the data of the assembled ELF.


This example shows how to create a shared library, and load it via LD_PRELOAD.

>>> context.clear()
>>> context.arch = 'amd64'
>>> sc = 'push rbp; mov rbp, rsp;'
>>> sc += shellcraft.echo('Hello\n')
>>> sc += 'mov rsp, rbp; pop rbp; ret'
>>> solib = make_elf_from_assembly(sc, shared=1)
>>> subprocess.check_output(['echo', 'World'], env={'LD_PRELOAD': solib})

The same thing can be done with make_elf(), though the sizes are different. They both

>>> file_a = make_elf(asm('nop'), extract=True)
>>> file_b = make_elf_from_assembly('nop', extract=True)
>>> file_a[:4] == file_b[:4]
>>> len(file_a) < 0x200
>>> len(file_b) > 0x1000

Internal Functions

These are only included so that their tests are run.

You should never need these.

pwnlib.asm.dpkg_search_for_binutils(arch, util)[源代码]

Use dpkg to search for any available assemblers which will work.

返回:A list of candidate package names.
>>> pwnlib.asm.dpkg_search_for_binutils('aarch64', 'as')
pwnlib.asm.print_binutils_instructions(util, context)[源代码]

On failure to find a binutils utility, inform the user of a way they can get it easily.


>>> context.clear(arch = 'amd64')
>>> pwnlib.asm.print_binutils_instructions('as', context)
Traceback (most recent call last):
PwnlibException: Could not find 'as' installed for ContextType(arch = 'amd64', bits = 64, endian = 'little')
Try installing binutils for this architecture:
$ sudo apt-get install binutils