Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.

Features

  • Show/set ASLR setting of GDB
  • Check for various security options of binary
  • Dump all ROP gadgets in specific memory range
  • Get headers information from debugged ELF file
  • Get non-debugging symbol information from an ELF file
  • Patch memory start at an address with string/hexstring/int
  • Generate, search, or write a cyclic pattern to memory

Project Samples

Project Activity

See All Activity >

License

Creative Commons Attribution License

Follow peda

peda Web Site

Other Useful Business Software
$300 in Free Credit Towards Top Cloud Services Icon
$300 in Free Credit Towards Top Cloud Services

Build VMs, containers, AI, databases, storage—all in one place.

Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Get Started
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of peda!

Additional Project Details

Programming Language

Python

Related Categories

Python Software Development Software

Registered

2021-12-06