PEDA Logo

PEDA

0
Free
Visit Website

PEDA (Python Exploit Development Assistance for GDB) enhances the display of gdb by colorizing and displaying disassembly codes, registers, and memory information during debugging. It also adds commands to support debugging and exploit development, such as checking ASLR settings, security options of binaries, displaying function arguments, dumping ROP gadgets, and more.

FEATURES

ALTERNATIVES

Advanced command and control tool for red teaming and adversary simulation with extensive features and evasion capabilities.

A tool for generating .NET serialized gadgets for triggering .NET assembly load/execution.

A collection of tips and tricks for container and container orchestration hacking

Collection of Windows oneliners for executing arbitrary code and downloading remote payloads.

A Go client to communicate with Chaos DB API

Utilizes dirtyc0w kernel exploit for privilege escalation in a Docker container.

Small script to simplify format string exploitation.

Adversary emulation framework for testing security measures in network environments.