Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.
Features
- Show/set ASLR setting of GDB
- Check for various security options of binary
- Dump all ROP gadgets in specific memory range
- Get headers information from debugged ELF file
- Get non-debugging symbol information from an ELF file
- Patch memory start at an address with string/hexstring/int
- Generate, search, or write a cyclic pattern to memory
Categories
Software DevelopmentLicense
Creative Commons Attribution LicenseFollow peda
Other Useful Business Software
Enterprise-grade ITSM, for every business
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of peda!