- Home
- Tools
- Security Operations
- Offensive Security
- GEF (pronounced ʤɛf - 'Jeff')
GEF (pronounced ʤɛf - 'Jeff')
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

GEF (pronounced ʤɛf - 'Jeff')
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
GEF (pronounced ʤɛf - 'Jeff') Description
GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.
GEF (pronounced ʤɛf - 'Jeff') FAQ
Common questions about GEF (pronounced ʤɛf - 'Jeff') including features, pricing, alternatives, and user reviews.
GEF (pronounced ʤɛf - 'Jeff') is A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.. It is a Security Operations solution designed to help security teams with Python, Reverse Engineering, Debugging.