PEDA Logo

PEDA

0
Free
Visit Website

PEDA (Python Exploit Development Assistance for GDB) enhances the display of gdb by colorizing and displaying disassembly codes, registers, and memory information during debugging. It also adds commands to support debugging and exploit development, such as checking ASLR settings, security options of binaries, displaying function arguments, dumping ROP gadgets, and more.

FEATURES

ALTERNATIVES

A free and open source C2 and proxy for penetration testers

A Python-based tool for identifying and exploiting file inclusion and directory traversal vulnerabilities in web applications.

CrossC2 enables generation of cross-platform payloads for CobaltStrike, enhancing operational flexibility.

A comprehensive .NET post-exploitation library designed for advanced security testing.

Docker image with essential tools for Kubernetes penetration testing.

A script to enumerate Google Storage buckets and determine access and privilege escalation

Collection of Return-Oriented Programming challenges for practicing exploitation skills.

Full-featured C2 framework for stealthy communication and control on web servers.

PINNED