GEF (pronounced ʤɛf - 'Jeff') Logo

GEF (pronounced ʤɛf - 'Jeff')

0
Free
Visit Website

GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.

FEATURES

ALTERNATIVES

Alpha release of External C2 framework for Cobalt Strike with enhanced data channels.

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

Pentest active directory LAB project for practicing attack techniques.

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A framework for exploiting Android-based devices and applications

An open source network penetration testing framework with automatic recon and scanning capabilities.

Weaponizing Kerberos protocol flaws for stealthy attacks on domain users.

An exploitation framework for industrial security with modules for controlling PLCs and scanning devices.