SECURITY RESEARCH TOOL - USE RESPONSIBLY
A security research tool for exploit development and analysis with built-in safety controls.
IMPORTANT: This tool is designed for:
- Authorized security research
- Educational purposes
- Penetration testing on systems you own or have explicit permission to test
PROHIBITED:
- Unauthorized testing on systems you don't own
- Malicious activities
- Violating local, state, federal, or international laws
By using this tool, you accept full responsibility for your actions.
- Buffer Overflow - Generate overflow payloads with safety checks
- ROP Chain Building - Construct ROP chains from gadgets
- Format String Exploits - Create format string payloads
- Shellcode Generation - Generate various shellcode types (with safety gates)
- Fuzzing - Create random payloads for testing
- Crash Detection - Detect and analyze program crashes
- Binary Analysis - Check security features and properties
- Dry-run by default - No actions executed without explicit consent
- Unsafe operations gated - Requires
--unsafeflag and interactive confirmation - Comprehensive logging - All unsafe actions are logged
- No destructive defaults - Cannot accidentally damage systems
# From source
git clone https://github.com/livepwn/LabExploit.git
cd LabExploit
sudo pip install -e . or if having error like me in pip try (sudo pip install --break-system-packages -e . )
sudo python3 setup.py develop
# Or via Debian package (when available)
dpkg -i liveexploit_*.debliveexploit --help
liveexploit --version
liveexploit analyze /bin/ls
liveexploit --dry-run analyze ./binaries/sample
liveexploit --dry-run buffer --padding 64 --ret-address 0xdeadbeef --arch i386
LIVEEXPLOIT_ALLOW_UNSAFE=1 printf "I UNDERSTAND\n" | liveexploit --unsafe buffer --padding 4096 --ret-address 0x401234 --arch amd64 > payload.bin
liveexploit --dry-run rop /bin/ls --gadgets 0x401000 0x402000
LIVEEXPLOIT_ALLOW_UNSAFE=1 printf "I UNDERSTAND\n" | liveexploit --unsafe rop /usr/bin/id --gadgets 0x500000 0x500100
liveexploit --dry-run fmt --offset 5 --write 0x601234 0x41414141
liveexploit --dry-run fmt --offset 7 --write 0x601000 0xdeadbeef --write 0x601004 0xcafebabe
liveexploit --dry-run shellcode exec --arch x64
LIVEEXPLOIT_ALLOW_UNSAFE=1 printf "I UNDERSTAND\n" | liveexploit --unsafe shellcode reverse --ip 127.0.0.1 --port 4444 --arch x64
liveexploit fuzz --length 500
liveexploit fuzz --length 200 --seed 12345
liveexploit detect-crash ./binary --payload /dev/null --timeout 10
LIVEEXPLOIT_ALLOW_UNSAFE=1 printf "I UNDERSTAND\n" | liveexploit --unsafe fuzz --iterations 500 ./binary
LIVEEXPLOIT_ALLOW_UNSAFE=1 printf "I UNDERSTAND\n" | liveexploit --unsafe memdump --pid 12345
liveexploit report --output exploit_report.json
liveexploit --help
liveexploit --dry-run analyze ./binaries/sample
liveexploit --dry-run buffer --padding 64 --ret-address 0x41414141 --arch amd64
liveexploit --dry-run fmt --offset 5 --write 0x601000 0xdeadbeef
liveexploit report --output demo_report.json
