# peda3 **Repository Path**: pwn2security/peda3 ## Basic Information - **Project Name**: peda3 - **Description**: 支持python3的peda - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 1 - **Forks**: 0 - **Created**: 2020-09-12 - **Last Updated**: 2024-07-10 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README peda ==== PEDA - Python Exploit Development Assistance for GDB ## Screenshot ![start](http://i.imgur.com/f22ZRro.png) ## Enhancements: This version has been extended by Zach Riggle to add some features and give dual-compatibility with Python2 and Python3. * Python2 and Python3 compatibility * Line width wrapping on banners * Colorize stack and heap differently than regular data * Show registers alongside stack output (and 'telescope' command) * Basic support for ARM and PPC registers * Support for passing GDB variables to PEDA routines (e.g. `hexdump $pc`) ## Key Features: These are the standard features of PEDA: * Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. * Add commands to support debugging and exploit development (for a full list of commands use `peda help`): * `aslr` -- Show/set ASLR setting of GDB * `checksec` -- Check for various security options of binary * `dumpargs` -- Display arguments passed to a function when stopped at a call instruction * `dumprop` -- Dump all ROP gadgets in specific memory range * `elfheader` -- Get headers information from debugged ELF file * `elfsymbol` -- Get non-debugging symbol information from an ELF file * `lookup` -- Search for all addresses/references to addresses which belong to a memory range * `patch` -- Patch memory start at an address with string/hexstring/int * `pattern` -- Generate, search, or write a cyclic pattern to memory * `procinfo` -- Display various info from /proc/pid/ * `pshow` -- Show various PEDA options and other settings * `pset` -- Set various PEDA options and other settings * `readelf` -- Get headers information from an ELF file * `ropgadget` -- Get common ROP gadgets of binary or library * `ropsearch` -- Search for ROP gadgets in memory * `searchmem|find` -- Search for a pattern in memory; support regex search * `shellcode` -- Generate or download common shellcodes. * `skeleton` -- Generate python exploit code template * `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process * `xormem` -- XOR a memory region with a key ## Installation git clone https://github.com/zachriggle/peda.git ~/peda echo "source ~/peda/peda.py" >> ~/.gdbinit echo "DONE! debug your program with gdb and enjoy"