Github url


by Gallopsled

Gallopsled /pwntools

CTF framework and exploit development library

6.7K Stars 1.3K Forks Last release: about 1 month ago (4.1.1) Other 3.8K Commits 86 Releases

Available items

No Items, yet!

The developer of this repository has not created any items for sale yet. Need a bug fixed? Help with integration? A different license? Create a request here:

pwntools - CTF toolkit

pwntools logo

PyPIDocsTravis GitHub Workflow Status (branch)CoverallsMIT LicenseTwitter

Pwntools is a CTF framework and exploit development library. Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible.

from pwn import \* context(arch = 'i386', os = 'linux') r = remote('', 31337) # EXPLOIT CODE GOES HERE r.send(asm( r.interactive()


Our documentation is available at

To get you started, we've provided some example solutions for past CTF challenges in our write-ups repository.


Pwntools is best supported on 64-bit Ubuntu LTE releases (14.04, 16.04, 18.04, and 20.04). Most functionality should work on any Posix-like distribution (Debian, Arch, FreeBSD, OSX, etc.). Python >= 2.7 is required (Python 3 suggested as best).

Most of the functionality of pwntools is self-contained and Python-only. You should be able to get running quickly with

apt-get update apt-get install python3 python3-pip python3-dev git libssl-dev libffi-dev build-essential python3 -m pip install --upgrade pip python3 -m pip install --upgrade pwntools

However, some of the features (assembling/disassembling foreign architectures) require non-Python dependencies. For more information, see the complete installation instructions here.




If you have any questions not worthy of a bug report, feel free to ping us at [


on Freenode](irc:// and ask away. Click here to connect. There is also a mailing list for higher latency discussion.

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.