Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.

Features

  • Show/set ASLR setting of GDB
  • Check for various security options of binary
  • Dump all ROP gadgets in specific memory range
  • Get headers information from debugged ELF file
  • Get non-debugging symbol information from an ELF file
  • Patch memory start at an address with string/hexstring/int
  • Generate, search, or write a cyclic pattern to memory

Project Samples

Project Activity

See All Activity >

License

Creative Commons Attribution License

Follow peda

peda Web Site

Other Useful Business Software
Cut Data Warehouse Costs by 54% Icon
Cut Data Warehouse Costs by 54%

Easily migrate from Snowflake, Redshift, or Databricks with free tools.

BigQuery delivers 54% lower TCO with exabyte scale and flexible pricing. Free migration tools handle the SQL translation automatically.
Try Free
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of peda!

Additional Project Details

Programming Language

Python

Related Categories

Python Software Development Software

Registered

2021-12-06