A comprehensive GUI utility toolkit designed to streamline repetitive and tedious tasks during security research, system hacking (Pwnable), and binary analysis.
This tool features specialized functionalities tailored for exploit development, such as GDB disassembly cleaning and stack frame visualization.
- Description: Automatically strips volatile absolute memory addresses (e.g.,
0x5555...) from GDBdisasoutputs. - Benefit: Reduces visual noise, leaving only code offsets and assembly instructions. Perfect for keeping your Write-ups clean, professional, and readable.
-
- Description: Provides quick encoding and decoding of Base64 strings.
- Benefit: Speeds up data decoding when handling encoded payloads in CTF challenges or web exploitation tasks.
- Numeral Conversion: Supports cross-conversion between Decimal, Hexadecimal, and Binary formats.
- String ↔ Hex: Converts plain text into shellcode-style hex format (
\x41\x42) and vice versa, allowing fast shellcode payload crafting. -
- Description: Reverses the byte order of the input hexadecimal stream.
- Benefit: Simplifies alignment when constructing Little Endian payloads for standard x86/x64 environments.
-
- Description: Parses functions for
sub esp/rspinstructions and[ebp/rbp - offset]patterns within the provided assembly code. - Benefit: Draws an intuitive visual map of the stack frame layout, Stack Canary placement, and relative variable offsets tailored to 32-bit (x86) and 64-bit (x64) architectures.
-
This application is built with Python 3 using Tkinter and the Pillow library.
Install the required dependencies:
pip install Pillow