reddit hackernews mail facebook facebook linkedin
peda

peda

Python Exploit Development Assistance for GDB.

Key Features:
- Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
- Add commands to support debugging and exploit development (for a full list of commands use peda help):
+ aslr -- Show/set ASLR setting of GDB
+ checksec -- Check for various security options of binary
+ dumpargs -- Display arguments passed to a function when stopped at a call instruction
+ dumprop -- Dump all ROP gadgets in specific memory range
+ elfheader -- Get headers information from debugged ELF file
+ elfsymbol -- Get non-debugging symbol information from an ELF file
+ lookup -- Search for all addresses/references to addresses which belong to a memory range
+ patch -- Patch memory start at an address with string/hexstring/int
+ pattern -- Generate, search, or write a cyclic pattern to memory
+ procinfo -- Display various info from /proc/pid/
+ pshow -- Show various PEDA options and other settings
+ pset -- Set various PEDA options and other settings
+ readelf -- Get headers information from an ELF file
+ ropgadget -- Get common ROP gadgets of binary or library
+ ropsearch -- Search for ROP gadgets in memory
+ searchmem|find -- Search for a pattern in memory; support regex search
+ shellcode -- Generate or download common shellcodes.
+ skeleton -- Generate python exploit code template
+ vmmap -- Get virtual mapping address ranges of section(s) in debugged process
+ xormem -- XOR a memory region with a key