• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering PEDA – Python Exploit Development Assistance for GDB v1.2 releases

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,608
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,600
‎6 Years of Service‎
 
76%
687474703a2f2f692e696d6775722e636f6d2f50314246356d702e706e67


peda

PEDA – Python Exploit Development Assistance for GDB

Key Features:

    Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
    Add commands to support debugging and exploit development (for a full list of commands use peda help):
        aslr — Show/set ASLR setting of GDB
        checksec — Check for various security options of binary
        dumpargs — Display arguments passed to a function when stopped at a call instruction
        dumprop — Dump all ROP gadgets in the specific memory range
        elfheader — Get headers information from debugged ELF file
        elfsymbol — Get non-debugging symbol information from an ELF file
        lookup — Search for all addresses/references to addresses which belong to a memory range
        patch — Patch memory start at an address with string/hexstring/int
        pattern — Generate, search or write a cyclic pattern to memory
        procinfo — Display various info from /proc/pid/
        pshow — Show various PEDA options and other settings
        pset — Set various PEDA options and other settings
        readelf — Get headers information from an ELF file
        ropgadget — Get common ROP gadgets of binary or library
        ropsearch — Search for ROP gadgets in memory
        searchmem|find — Search for a pattern in memory; support regex search
        shellcode — Generate or download common shellcodes.
        skeleton — Generate python exploit code template
        vmmap — Get virtual mapping address ranges of section(s) in debugged process
        xormem — XOR a memory region with a key

Changelog v1.2

    Bug fixes

To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top