We now support tracking the program enabling PIE. The example in example_bin/pwn200_PIE
$ python getOverFlowOffset.py 0x00000632 example_bin/pwn200_PIE
[*] example_bin/pwn200_PIE is 32 bits
[*] PIE is enabled
[*] Found a leak function: write
[*] Found the leaked address 0x565556c2, we can leave
[*] The real vul_ret_address is:0x56555632
[+] Found offset to the EBP is 108.
[+] THe offset to the RET_ADDR is 112 (32bits) or 116 (64bits).
For the program without PIE. The example in example_bin/xdctf15-pwn200
$ python getOverFlowOffset.py 0x080484BD example_bin/xdctf15-pwn200
[*] example_bin/xdctf15-pwn200 is 32 bits
[*] no PIE
[+] Found offset to the EBP is 108.
[+] THe offset to the RET_ADDR is 112 (32bits) or 116 (64bits).