GEF (pronounced ʤɛf - 'Jeff')
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

GEF (pronounced ʤɛf - 'Jeff')
A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.
GEF (pronounced ʤɛf - 'Jeff') Description
GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.
GEF (pronounced ʤɛf - 'Jeff') FAQ
Common questions about GEF (pronounced ʤɛf - 'Jeff') including features, pricing, alternatives, and user reviews.
GEF (pronounced ʤɛf - 'Jeff') is A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.. It is a Security Operations solution designed to help security teams with Reverse Engineering, Dynamic Analysis, Exploit Development.
ALTERNATIVES
Automated hardware reversing platform using robotics for embedded device analysis
AI agent platform for automating offensive security operations and evals.
POPULAR
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox