GEF (pronounced ʤɛf - 'Jeff') Logo

GEF (pronounced ʤɛf - 'Jeff')

0
Free
Visit Website

GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.

FEATURES

ALTERNATIVES

A subdomain enumeration tool for penetration testers and security researchers.

A repository containing material for Android greybox fuzzing with AFL++ Frida mode

Automatic SSRF fuzzer and exploitation tool

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.

A modular and script-friendly multithread bruteforcer for managing task parameters in Python scripts.

A Go client to communicate with Chaos DB API

Pupy is a cross-platform C2 and post-exploitation framework for remote access and control of compromised systems across various operating systems.

A comprehensive guide for customizing Cobalt Strike's C2 profiles to enhance stealth and operational security.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved