目录
目录README.md

peda

PEDA - Python Exploit Development Assistance for GDB

Key Features:

  • Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
  • Add commands to support debugging and exploit development (for a full list of commands use peda help):
    • aslr – Show/set ASLR setting of GDB
    • checksec – Check for various security options of binary
    • dumpargs – Display arguments passed to a function when stopped at a call instruction
    • dumprop – Dump all ROP gadgets in specific memory range
    • elfheader – Get headers information from debugged ELF file
    • elfsymbol – Get non-debugging symbol information from an ELF file
    • lookup – Search for all addresses/references to addresses which belong to a memory range
    • patch – Patch memory start at an address with string/hexstring/int
    • pattern – Generate, search, or write a cyclic pattern to memory
    • procinfo – Display various info from /proc/pid/
    • pshow – Show various PEDA options and other settings
    • pset – Set various PEDA options and other settings
    • readelf – Get headers information from an ELF file
    • ropgadget – Get common ROP gadgets of binary or library
    • ropsearch – Search for ROP gadgets in memory
    • searchmem|find – Search for a pattern in memory; support regex search
    • shellcode – Generate or download common shellcodes.
    • skeleton – Generate python exploit code template
    • vmmap – Get virtual mapping address ranges of section(s) in debugged process
    • xormem – XOR a memory region with a key

Installation

git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"

Screenshot

start

pattern arg

patts

关于
832.0 KB
邀请码
    Gitlink(确实开源)
  • 加入我们
  • 官网邮箱:gitlink@ccf.org.cn
  • QQ群
  • QQ群
  • 公众号
  • 公众号

©Copyright 2023 CCF 开源发展委员会
Powered by Trustie& IntelliDE 京ICP备13000930号