PEDA Logo

PEDA

0
Free
Visit Website

PEDA (Python Exploit Development Assistance for GDB) enhances the display of gdb by colorizing and displaying disassembly codes, registers, and memory information during debugging. It also adds commands to support debugging and exploit development, such as checking ASLR settings, security options of binaries, displaying function arguments, dumping ROP gadgets, and more.

FEATURES

ALTERNATIVES

Python framework for building and utilizing interfaces to transfer data between frameworks with a focus on Command and Control frameworks.

Rip web accessible (distributed) version control systems: SVN, GIT, Mercurial/hg, bzr, ...

A framework for testing and exploiting race conditions in software

A command that builds and executes command lines from standard input, allowing for the execution of commands with multiple arguments.

A tool for interacting with Exchange servers remotely and exploiting client-side Outlook features.

Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.

A YARA interactive debugger for the YARA language written in Rust, providing features like function calls, constant evaluation, and string matching.

A full-featured reconnaissance framework for web-based reconnaissance with a modular design.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved