您的位置:首页 > 编程语言 > Python开发

peda 官方帮助文档

2016-11-12 16:47 232 查看

peda 官方帮助文档

PEDA - Python Exploit Development Assistance for GDB

Key Features:

Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.

Add commands to support debugging and exploit development (for a full list of commands use
peda help
):

aslr
– Show/set ASLR setting of GDB

checksec
– Check for various security options of binary

dumpargs
– Display arguments passed to a function when stopped at a call instruction

dumprop
– Dump all ROP gadgets in specific memory range

elfheader
– Get headers information from debugged ELF file

elfsymbol
– Get non-debugging symbol information from an ELF file

lookup
– Search for all addresses/references to addresses which belong to a memory range

patch
– Patch memory start at an address with string/hexstring/int

pattern
– Generate, search, or write a cyclic pattern to memory

procinfo
– Display various info from /proc/pid/

pshow
– Show various PEDA options and other settings

pset
– Set various PEDA options and other settings

readelf
– Get headers information from an ELF file

ropgadget
– Get common ROP gadgets of binary or library

ropsearch
– Search for ROP gadgets in memory

searchmem|find
– Search for a pattern in memory; support regex search

shellcode
– Generate or download common shellcodes.

skeleton
– Generate python exploit code template

vmmap
– Get virtual mapping address ranges of section(s) in debugged process

xormem
– XOR a memory region with a key

Installation

git clone https://github.com/longld/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"


Screenshot





内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签:  python gdb PEDA