hijack_fd ¤
Classes:
Functions:
-
get_shellcode_regs
– -
stack_size_alignment
– -
asm_replace_file
– -
asm_replace_socket
– -
exec_shellcode_with_stack
– -
parse_socket
– -
parse_file_or_socket
– -
hijack_fd
–
Attributes:
parser module-attribute
¤
parser = ArgumentParser(
description="Replace a file descriptor of a debugged process.\n\nThe new file descriptor can point to:\n- a file\n- a pipe\n- a socket\n- a device, etc.\n\nExamples:\n1. Redirect STDOUT to a file:\n `hijack-fd 1 /dev/null`\n\n2. Redirect STDERR to a socket:\n `hijack-fd 2 tcp://localhost:8888`\n"
)
ShellcodeRegs ¤
ParsedSocket ¤
Bases: NamedTuple
Attributes:
-
protocol
(Literal['tcp', 'udp']
) – -
ip_version
(Literal['ipv4', 'ipv6']
) – -
address
(str
) – -
port
(int
) –
asm_replace_socket ¤
asm_replace_socket(
replace_fd: int, socket_data: ParsedSocket
) -> tuple[int, str]
exec_shellcode_with_stack async
¤
exec_shellcode_with_stack(ec: ExecutionController, blob, stack_size: int)