tomato42 / marvin-toolkit

A set of tools and instructions to check if a library is vulnerable to the Marvin attack
GNU General Public License v2.0
18 stars 8 forks source link

add custom entry in step2.py #14

Open gogo2464 opened 3 months ago

gogo2464 commented 3 months ago

Start to fix https://github.com/tomato42/marvin-toolkit/issues/8

Sorry for the delay I was busy.

I created a new function. The base does not sounds pertinent I should find another function to start exploit coding.

I just need to choose a good one to start encrypting the 0x00 and 0x02 for padding.

gogo2464 commented 3 months ago

@tomato42 I suggest to add input for headers to no_header_with_payload() so that we could start the exploit dev quickly.

gogo2464 commented 3 months ago

I would like to add more input to the function types["no_structure_with_chosen_plaintext"] = len(chosen_plaintext) can I remove the confusing for me variable types.