Automated framework for analyzing ELF binaries, detecting vulnerabilities, and generating exploits.
🔐 This tool is for EDUCATIONAL PURPOSES ONLY.
- Use only on systems you own or have explicit written permission to test
- Do not use for malicious activities
- Author is not responsible for misuse of this tool
- Intended for: CTF competitions, security research, penetration testing training
- Parse ELF headers and sections
- Extract symbols and function addresses
- Detect architecture, endianness, and bitness
- NX (No-Execute): Detect executable stack
- PIE (Position Independent Executable): Check for ASLR compatibility
- Stack Canary: Detect stack protection
- RELRO: Check GOT protection level
- Static analysis for dangerous functions (
gets,strcpy,sprintf, etc.) - Pattern-based vulnerability identification
- Buffer overflow risk assessment
- Fuzzing engine with cyclic pattern generation
- Automatic offset calculation
- Shellcode injection (when NX disabled)
- ROP chain generation (when NX enabled)
- Auto-generate working exploit scripts
- Reproducible payloads
- Detailed exploit reports
- Linux x86_64 (Ubuntu/Kali recommended)
- Python 3.8+
pwntools,nasm,binutils
# Clone repository
git clone https://github.com/Unreal7123/elf-exploit-framework.git
cd elf-exploit-framework
# Create virtual environment
python3 -m venv venv
source venv/bin/activate
# Install dependencies
pip install -r requirements.txt
# Install system tools (Ubuntu/Debian)
sudo apt update
sudo apt install nasm binutils gdb -y