GEF (pronounced ʤɛf - 'Jeff') Logo

GEF (pronounced ʤɛf - 'Jeff')

A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.

8,053
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

GEF (pronounced ʤɛf - 'Jeff') Description

GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.

GEF (pronounced ʤɛf - 'Jeff') FAQ

Common questions about GEF (pronounced ʤɛf - 'Jeff') including features, pricing, alternatives, and user reviews.

GEF (pronounced ʤɛf - 'Jeff') is A set of commands for exploit developers and reverse-engineers to enhance GDB functionality.. It is a Security Operations solution designed to help security teams with Reverse Engineering, Dynamic Analysis, Exploit Development.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

Nightwing DejaVM Logo

Whole-system emulation environment for software dev, debugging, testing & security

0
Red Balloon Security RASPUTIN Logo

Automated hardware reversing platform using robotics for embedded device analysis

0
Dreadnode Offensive Security Agents Logo

AI agent platform for automating offensive security operations and evals.

0
REDLattice Logo

AI-assisted vulnerability research and advanced offensive cyber tooling firm.

0
Two Six Technologies Logo

R&D firm providing cyber defense & operational tech for DoD and DHS.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox