[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#1002935: ITP: pwntools -- CTF framework and exploit development library



Package: wnpp
Severity: wishlist
Owner: Timo Röhling <roehling@debian.org>
X-Debbugs-Cc: debian-devel@lists.debian.org

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

* Package name    : pwntools
  Version         : 4.7.0
  Upstream Author : Gallopsled et al. <pwntools-users@googlegroups.com>
* URL             : https://pwntools.com
* License         : Expat, GPL, BSD
  Programming Lang: Python
  Description     : CTF framework and exploit development library

pwntools is designed for rapid prototyping and development, to make
exploit writing as simple as possible. The primary use case of this
framework are CTF hacking contests, where vulnerabilities in a sandbox
environment are exploited to gain access to a "flag" file or secret
string, as proof of success.

I'm packaging this framework out of personal interest and intend to
maintain it as part of the Python Team. Most dependencies are available
in Debian already, with the exception of ROPgadget, colored_traceback,
and the RPyC Remote Procedure Call library, which are currently waiting
in NEW.


-----BEGIN PGP SIGNATURE-----

iQGzBAEBCgAdFiEEJvtDgpxjkjCIVtam+C8H+466LVkFAmHQavAACgkQ+C8H+466
LVnoUwv9EUqhQQckIF2ZX4iXwJeAc8Nwtju4XZ+bq8pB1BeSjeCrfqiXeZPLrxl+
0iNS9m6uIt5dAVHcvivvyunnkKtZpc73HxUSOtbHiJd+D3Gs8CVaF32entfpqTys
o4M2yIBViKzE8mFuBZ052akWNEMVijRXaUMH+DPUvsMi6Z/iuL80J77cTzoQlweq
qoxnoI3XrY9lye58Dk5DHHTjAqIFiGju97tqxIiGs4ri3GW6MHFzflHCs65dPUt5
lpNNjGRk8p64s/wen5SAJumsVi9H8MA2u990RcYQ9WxwHISZ7FmXYfvEbgqklkx2
sWW+ENB4nRm+XeV1MVX/PG6yfRc3VUD6iR/++U+ZgBDacmjO50t152c6F1pK/MLc
SG9bvMnup4L4btX4GXYNZwkPMHHZqNzeWSjp+WT2LNqcNMk/Y4ORmAvWWeRkAID7
WwJ5Ib5nI7fSYWIFmL33ZYnFJ8xM8ZixbsFuSV6mhjzfMHUhc2bfD6AAMjHeHx9T
ef//esHq
=F7Gm
-----END PGP SIGNATURE-----

Reply to: