Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.

Features

  • Show/set ASLR setting of GDB
  • Check for various security options of binary
  • Dump all ROP gadgets in specific memory range
  • Get headers information from debugged ELF file
  • Get non-debugging symbol information from an ELF file
  • Patch memory start at an address with string/hexstring/int
  • Generate, search, or write a cyclic pattern to memory

Project Samples

Project Activity

See All Activity >

License

Creative Commons Attribution License

Follow peda

peda Web Site

Other Useful Business Software
Try Google Cloud Risk-Free With $300 in Credit Icon
Try Google Cloud Risk-Free With $300 in Credit

No hidden charges. No surprise bills. Cancel anytime.

Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of peda!

Additional Project Details

Programming Language

Python

Related Categories

Python Software Development Software

Registered

2021-12-06