PEDA Logo

PEDA

0
Free
Visit Website

PEDA (Python Exploit Development Assistance for GDB) enhances the display of gdb by colorizing and displaying disassembly codes, registers, and memory information during debugging. It also adds commands to support debugging and exploit development, such as checking ASLR settings, security options of binaries, displaying function arguments, dumping ROP gadgets, and more.

FEATURES

ALTERNATIVES

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

Explore the top million websites, ranked by referring subnets, and gain insights into online influence and popularity.

A powerful enumeration tool for discovering assets and subdomains.

Modern, asynchronous, multiplayer & multiserver C2/post-exploitation framework with Python 3 and .NETs DLR.

A black-box obfuscation tool for Android apps with Android App Bundle support.

A CRLF and open redirect fuzzer