Skip to content

Commit eb46ecd

Browse files
Update README.md
1 parent 92a9603 commit eb46ecd

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF p
33

44
This tool uses [angr](https://github.com/angr/angr) to concolically analyze binaries by hooking printf and looking for [unconstrained paths](https://github.com/angr/angr-doc/blob/master/docs/examples.md#vulnerability-discovery). These program states are then weaponized for remote code execution through [pwntools](https://github.com/Gallopsled/pwntools) and a series of script tricks. Finally the payload is tested locally then submitted to a remote CTF server to recover the flag.
55

6-
[![asciicast](https://asciinema.org/a/14.png)](https://asciinema.org/a/14)
6+
[![asciicast](https://asciinema.org/a/457964.svg)](https://asciinema.org/a/457964)
77

88
## Version 2.1 changes
99

0 commit comments

Comments
 (0)