Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.

Features

  • Show/set ASLR setting of GDB
  • Check for various security options of binary
  • Dump all ROP gadgets in specific memory range
  • Get headers information from debugged ELF file
  • Get non-debugging symbol information from an ELF file
  • Patch memory start at an address with string/hexstring/int
  • Generate, search, or write a cyclic pattern to memory

Project Samples

Project Activity

See All Activity >

License

Creative Commons Attribution License

Follow peda

peda Web Site

Other Useful Business Software
Simplify Purchasing For Your Business Icon
Simplify Purchasing For Your Business

Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
Learn More
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of peda!

Additional Project Details

Programming Language

Python

Related Categories

Python Software Development Software

Registered

2021-12-06