Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.
Features
- Show/set ASLR setting of GDB
- Check for various security options of binary
- Dump all ROP gadgets in specific memory range
- Get headers information from debugged ELF file
- Get non-debugging symbol information from an ELF file
- Patch memory start at an address with string/hexstring/int
- Generate, search, or write a cyclic pattern to memory
Categories
Software DevelopmentLicense
Creative Commons Attribution LicenseFollow peda
Other Useful Business Software
Cut Data Warehouse Costs by 54%
BigQuery delivers 54% lower TCO with exabyte scale and flexible pricing. Free migration tools handle the SQL translation automatically.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of peda!