summaryrefslogtreecommitdiffstats
path: root/tools
diff options
context:
space:
mode:
authorMalfurious <m@lfurio.us>2021-08-22 08:25:26 -0400
committerMalfurious <m@lfurio.us>2021-08-22 08:25:26 -0400
commit89c13129a55ccbecda31614c83e88612972c11a6 (patch)
tree3355a91dce4e827aea02d09cbdd7b5a164f6cad8 /tools
parent9a5f29e228846a2a7fda8497e72c94cad516376c (diff)
downloadlib-des-gnux-89c13129a55ccbecda31614c83e88612972c11a6.tar.gz
lib-des-gnux-89c13129a55ccbecda31614c83e88612972c11a6.zip
Refactor genhex into shelltool
For convenience, I've rewritten my old shellcode parser program in Python. It is moved to the shellcode templates dir and renamed to shelltool. As a new feature, shelltool will now check the result for NULL bytes and newline bytes that may cause problems in an exploit. Signed-off-by: Malfurious <m@lfurio.us>
Diffstat (limited to '')
-rw-r--r--tools/genhex.cpp33
1 files changed, 0 insertions, 33 deletions
diff --git a/tools/genhex.cpp b/tools/genhex.cpp
deleted file mode 100644
index a37f91e..0000000
--- a/tools/genhex.cpp
+++ /dev/null
@@ -1,33 +0,0 @@
-#include <iostream>
-#include <string>
-
-/*
- * Read in all of stdin (should be piped from objdump), look for bytecode hex,
- * and print this code, escaped in a C-string literal, to stdout.
- *
- * EG output: "\x01\x02\x03\x04"
- */
-
-int main()
-{
- std::string tmp;
- unsigned int hex;
-
- std::cout << "\"";
-
- while (true)
- {
- std::cin >> tmp;
-
- if (std::cin.eof())
- break;
-
- if (tmp.size() == 2 &&
- tmp.find(":") == std::string::npos &&
- sscanf(tmp.c_str(), "%x", &hex) > 0)
- std::cout << "\\x" << tmp;
- }
-
- std::cout << "\"\n";
- return 0;
-}