Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.
Features
- Show/set ASLR setting of GDB
- Check for various security options of binary
- Dump all ROP gadgets in specific memory range
- Get headers information from debugged ELF file
- Get non-debugging symbol information from an ELF file
- Patch memory start at an address with string/hexstring/int
- Generate, search, or write a cyclic pattern to memory
Categories
Software DevelopmentLicense
Creative Commons Attribution LicenseFollow peda
Other Useful Business Software
Collect! is a highly configurable debt collection software
The flexible & scalable debt collection software built to automate your workflow. From startup to enterprise, we have the solution for you.
Rate This Project
Login To Rate This Project
User Reviews
Be the first to post a review of peda!