{ "info": { "author": "Philippe Gr\u00e9goire", "author_email": "git@pgregoire.xyz", "bugtrack_url": null, "classifiers": [], "description": "================\nexploit-patterns\n================\n\nProvides Python implementations of the ``pattern_create`` and\n``pattern_offset`` tools from the Metasploit framework. They're meant to\nbe used by penetration testers wanting to use them without having to\nreach to Metasploit or a Ruby environment every time.\n\n\nusage\n=====\n\nGenerate a pattern to overflow the buffer using ``pattern_create``::\n\n pattern_create\n\nNote the return address on which the PC crashed and pass it to ``pattern_offset``::\n\n pattern_offset Zz8Z\n\n\n", "description_content_type": "", "docs_url": null, "download_url": "", "downloads": { "last_day": -1, "last_month": -1, "last_week": -1 }, "home_page": "http://pypi.python.org/pypi/exploit-patterns/", "keywords": "", "license": "LICENSE", "maintainer": "", "maintainer_email": "", "name": "exploit-patterns", "package_url": "https://pypi.org/project/exploit-patterns/", "platform": "", "project_url": "https://pypi.org/project/exploit-patterns/", "project_urls": { "Homepage": "http://pypi.python.org/pypi/exploit-patterns/" }, "release_url": "https://pypi.org/project/exploit-patterns/1.0.0/", "requires_dist": null, "requires_python": "", "summary": "pattern_create and pattern_offset", "version": "1.0.0" }, "last_serial": 4856253, "releases": { "1.0.0": [ { "comment_text": "", "digests": { "md5": "84ae0067aec2fd034ddd660ffcbb770d", "sha256": "35f25e1b72f3a12c9f1b178ec1b972aa1fbf9ce9d5b56dccc1fefd2f83906d0f" }, "downloads": -1, "filename": "exploit_patterns-1.0.0-py3-none-any.whl", "has_sig": false, "md5_digest": "84ae0067aec2fd034ddd660ffcbb770d", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 5107, "upload_time": "2019-02-22T22:51:27", "url": "https://files.pythonhosted.org/packages/49/17/d586906723b0b253c279c9a391784b933d50453bd1b7bd185c9012622fe4/exploit_patterns-1.0.0-py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "ac7984332beaee4b9cb981bd4fa46ad3", "sha256": "b93b687d28ec92e391bb28a140c2507fb38ef37adf93bd173c9248f8f788a2d2" }, "downloads": -1, "filename": "exploit-patterns-1.0.0.tar.gz", "has_sig": false, "md5_digest": "ac7984332beaee4b9cb981bd4fa46ad3", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 2625, "upload_time": "2019-02-22T22:51:29", "url": "https://files.pythonhosted.org/packages/02/c2/9d4e748e35cc6a116013ce6d4e16bb25fd395c8c0beb50047b0ff689d75a/exploit-patterns-1.0.0.tar.gz" } ] }, "urls": [ { "comment_text": "", "digests": { "md5": "84ae0067aec2fd034ddd660ffcbb770d", "sha256": "35f25e1b72f3a12c9f1b178ec1b972aa1fbf9ce9d5b56dccc1fefd2f83906d0f" }, "downloads": -1, "filename": "exploit_patterns-1.0.0-py3-none-any.whl", "has_sig": false, "md5_digest": "84ae0067aec2fd034ddd660ffcbb770d", "packagetype": "bdist_wheel", "python_version": "py3", "requires_python": null, "size": 5107, "upload_time": "2019-02-22T22:51:27", "url": "https://files.pythonhosted.org/packages/49/17/d586906723b0b253c279c9a391784b933d50453bd1b7bd185c9012622fe4/exploit_patterns-1.0.0-py3-none-any.whl" }, { "comment_text": "", "digests": { "md5": "ac7984332beaee4b9cb981bd4fa46ad3", "sha256": "b93b687d28ec92e391bb28a140c2507fb38ef37adf93bd173c9248f8f788a2d2" }, "downloads": -1, "filename": "exploit-patterns-1.0.0.tar.gz", "has_sig": false, "md5_digest": "ac7984332beaee4b9cb981bd4fa46ad3", "packagetype": "sdist", "python_version": "source", "requires_python": null, "size": 2625, "upload_time": "2019-02-22T22:51:29", "url": "https://files.pythonhosted.org/packages/02/c2/9d4e748e35cc6a116013ce6d4e16bb25fd395c8c0beb50047b0ff689d75a/exploit-patterns-1.0.0.tar.gz" } ] }