From eb46ecdee3ea44f7b7a6a47a4181b7a1608b54bf Mon Sep 17 00:00:00 2001 From: Christopher Roberts Date: Wed, 22 Dec 2021 02:28:35 -0500 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index c6ee573..7b96480 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@ Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF p This tool uses [angr](https://github.com/angr/angr) to concolically analyze binaries by hooking printf and looking for [unconstrained paths](https://github.com/angr/angr-doc/blob/master/docs/examples.md#vulnerability-discovery). These program states are then weaponized for remote code execution through [pwntools](https://github.com/Gallopsled/pwntools) and a series of script tricks. Finally the payload is tested locally then submitted to a remote CTF server to recover the flag. -[![asciicast](https://asciinema.org/a/14.png)](https://asciinema.org/a/14) +[![asciicast](https://asciinema.org/a/457964.svg)](https://asciinema.org/a/457964) ## Version 2.1 changes