Liveexploit
LiveExploit is a CTF & binary exploitation toolkit that automates payload generation, ROP chains, shellcode creation, and crash analysis for exploit development. It provides an interactive CLI for quick prototyping of exploits in CTFs and security research.
Install / Use
/learn @0-d-a-y/LiveexploitREADME

Live Exploit
The Live Exploit is a powerful and versatile Python-based tool designed for Capture The Flag (CTF) challenges, exploit development, and vulnerability research. It provides a wide range of functionalities, including buffer overflow payload generation, ROP chain creation, shellcode generation, fuzzing, crash detection, binary analysis, and more. The tool is built with an interactive command-line interface (CLI) for ease of use and is ideal for both beginners and advanced users in cybersecurity.
About Me
Hi, I'm [Rana M.Sinan Adil], a [Pentester] with a passion for [Building tools for my hacker friends]. I specialize in [Exploit development, reverse engineering, etc.] and enjoy working on projects that challenge me to learn and grow.
- Email: Email
- Website/Blog: Your Website/Blog
Feel free to reach out if you have any questions, suggestions, or just want to connect!
Features
- Buffer Overflow Payload Generator:
- Generate custom buffer overflow payloads with padding, return addresses, and optional shellcode.
- ROP Chain Generator:
- Create Return-Oriented Programming (ROP) chains using specified gadgets from a binary.
- Format String Exploit:
- Generate payloads for format string vulnerabilities to read or write memory.
- Shellcode Generation:
- Generate reverse or bind shellcode for exploitation.
- Fuzzing:
- Generate random fuzzing payloads to test for vulnerabilities.
- Crash Detection:
- Detect crashes in a binary by running it with a payload.
- Memory Dumping:
- Dump memory from a binary for analysis.
- Binary Analysis:
- Analyze a binary for symbols, architecture, and security protections (NX, PIE, Canary).
- Exploit Execution:
- Execute exploits locally or remotely with interactive shell access.
- Heap Exploitation:
- Simulate heap exploitation scenarios (e.g., malloc/free).
- Kernel Exploitation:
- Simulate kernel module loading for kernel exploitation.
- Payload Delivery:
- Deliver payloads via HTTP or FTP.
- Reporting:
- Generate detailed exploit reports in JSON format.
- Interactive CLI:
- User-friendly interactive command-line interface with auto-completion.
Advantages
- All-in-One Toolkit: Combines multiple exploit development tools into a single interface.
- Ease of Use: Interactive CLI with auto-completion and intuitive commands.
- Customizable: Easily extendable with new exploits or features.
- Efficient: Automates repetitive tasks like payload generation and crash detection.
- Cross-Platform: Works on Linux, macOS, and Windows (with WSL).
Installation
Prerequisites
- Python 3.x
pwntoolslibrarycryptographylibraryprompt_toolkitlibrary
Steps
- Clone the repository:
git clone https://github.com/0-d-a-y/liveexploit.git cd liveexploit chmod +x liveexploit.py chmod +x vulnerable
Usage
Basic Usage
Run the tool with a binary as an argument:
python3 liveexploit.py ./vulnerable
And just press [tab]
Interactive CLI
Once the tool is running, you can use the following commands in the interactive CLI:
Command Description
1: buffer_overflow: Generate a buffer overflow payload.
2: rop_chain Generate a ROP chain.
3: format_string Generate a format string exploit payload.
4: shellcode Generate reverse or bind shellcode.
5: fuzzing Generate a random fuzzing payload.
6: crash_detection Detect crashes in a binary.
7: dump_memory Dump memory from a binary.
8: binary_analysis Analyze a binary for symbols and protections.
9: execute_exploit Execute an exploit locally or remotely.
10: heap_exploit Simulate heap exploitation.
11: kernel_exploit Simulate kernel exploitation.
12: deliver_payload Deliver a payload via HTTP or FTP.
13: generate_report Generate an exploit report in JSON format.
exit Exit the interactive CLI.
Examples
1. Generate a Buffer Overflow Payload
livepwn> buffer_overflow
Buffer size: 100
Return address (in hex): 0xdeadbeef
Add shellcode? (y/n): y
2. Generate a ROP Chain
livepwn> rop_chain
Enter gadgets (comma-separated): 0x400123,0x400456
3. Generate Reverse Shellcode
livepwn> shellcode
Shell type (reverse/bind): reverse
IP for reverse shell: 127.0.0.1
Port: 4444
4. Analyze a Binary
livepwn> binary_analysis
Binary: ./vulnerable
Architecture: amd64
Address: 0x400000
Symbols: {'main': 0x4005f6, ...}
Protections: NX=True, PIE=False, Canary=False
5. Execute an Exploit
livepwn> execute_exploit
Remote exploit? (y/n): n
License
⚠ License Notice
This software is proprietary and strictly cannot be modified, redistributed, or reuploaded.
Any violations will result in DMCA enforcement and legal action if necessary.
Contributing
Contributions are welcome! If you'd like to add new features, improve existing ones, or fix bugs, please follow these steps:
. Fork the repository.
. Create a new branch for your feature or bugfix.
. Submit a pull request with a detailed description of your changes.
Author
Contact: For questions or feedback, please open an issue on GitHub.
Related Skills
node-connect
347.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
107.8kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
347.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
347.0kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
