# peda **Repository Path**: hackcat_admin/peda ## Basic Information - **Project Name**: peda - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-02-23 - **Last Updated**: 2020-12-20 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README peda ==== PEDA - Python Exploit Development Assistance for GDB ## Key Features: * Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. * Add commands to support debugging and exploit development (for a full list of commands use `peda help`): * `aslr` -- Show/set ASLR setting of GDB * `checksec` -- Check for various security options of binary * `dumpargs` -- Display arguments passed to a function when stopped at a call instruction * `dumprop` -- Dump all ROP gadgets in specific memory range * `elfheader` -- Get headers information from debugged ELF file * `elfsymbol` -- Get non-debugging symbol information from an ELF file * `lookup` -- Search for all addresses/references to addresses which belong to a memory range * `patch` -- Patch memory start at an address with string/hexstring/int * `pattern` -- Generate, search, or write a cyclic pattern to memory * `procinfo` -- Display various info from /proc/pid/ * `pshow` -- Show various PEDA options and other settings * `pset` -- Set various PEDA options and other settings * `readelf` -- Get headers information from an ELF file * `ropgadget` -- Get common ROP gadgets of binary or library * `ropsearch` -- Search for ROP gadgets in memory * `searchmem|find` -- Search for a pattern in memory; support regex search * `shellcode` -- Generate or download common shellcodes. * `skeleton` -- Generate python exploit code template * `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process * `xormem` -- XOR a memory region with a key ## Installation git clone https://github.com/longld/peda.git ~/peda echo "source ~/peda/peda.py" >> ~/.gdbinit echo "DONE! debug your program with gdb and enjoy" ## Screenshot ![start](http://i.imgur.com/P1BF5mp.png) ![pattern arg](http://i.imgur.com/W97OWRC.png) ![patts](http://i.imgur.com/Br24IpC.png)