Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.
Features
- Show/set ASLR setting of GDB
- Check for various security options of binary
- Dump all ROP gadgets in specific memory range
- Get headers information from debugged ELF file
- Get non-debugging symbol information from an ELF file
- Patch memory start at an address with string/hexstring/int
- Generate, search, or write a cyclic pattern to memory
Categories
Software DevelopmentLicense
Creative Commons Attribution LicenseFollow peda
Other Useful Business Software
Go From AI Idea to AI App Fast
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of peda!