PEDA Logo

PEDA

0
Free
Visit Website

PEDA (Python Exploit Development Assistance for GDB) enhances the display of gdb by colorizing and displaying disassembly codes, registers, and memory information during debugging. It also adds commands to support debugging and exploit development, such as checking ASLR settings, security options of binaries, displaying function arguments, dumping ROP gadgets, and more.

FEATURES

ALTERNATIVES

A blog post discussing the often overlooked dangers of CSV injection in applications.

Automatic tool for DNS rebinding-based SSRF attacks

A guide on using Apache mod_rewrite to strengthen phishing attacks and bypass mobile device restrictions

A macOS Initial Access Payload Generator for penetration testing and red teaming exercises.

A project for demonstrating AWS attack techniques with a focus on ethical hacking practices.

A guide on basic Linux privilege escalation techniques including enumeration, data analysis, exploit customization, and trial and error.

Emulate offensive attack techniques in the cloud with a self-contained Go binary.

Automatic SSRF fuzzer and exploitation tool

PINNED