GEF is a set of commands for x86/64, ARM, MIPS, PowerPC, and SPARC to assist exploit developers and reverse-engineers using GDB. It provides additional features using the Python API for dynamic analysis and exploit development, simplifying GDB commands and providing relevant information from the debugging runtime. To install, ensure GDB 8.0+ is compiled with Python3.6+ bindings and run the provided setup commands.
Common questions about GEF (pronounced ʤɛf - 'Jeff') including features, pricing, alternatives, and user reviews.
GEF (pronounced ʤɛf - 'Jeff') is A set of commands for exploit developers and reverse-engineers to enhance GDB functionality. It is a Security Operations solution designed to help security teams with Reverse Engineering, Dynamic Analysis, Exploit Development.
PinCTF is a Python wrapper tool that uses Intel's Pin framework to instrument binaries and count instructions for reverse engineering analysis.
angr is a Python-based binary analysis framework that provides disassembly, symbolic execution, and program analysis capabilities for cross-platform binary examination.
PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.
Automated hardware reversing platform using robotics for embedded device analysis