Jump to content
YOUR-AD-HERE
HOSTING
TOOLS
SERVICE

Search the Community

Showing results for tags 'gdb'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Pentesting Zone
    • Pentesting Accounts
    • Reverse Engineering
  • Security & Anonymity
    • Security
    • Wireless Security
    • Web Security
    • Anonymity
  • Operating Systems | Hardware | Programs
    • Operating systems
    • Hardware
    • PC programs
    • iOS
    • Android
  • Graphic Design
    • Graphic Design
  • vBCms Comments
  • live stream tv
    • live stream tv
  • Marketplace
    • Sell
    • Services
    • Request
  • Pentesting Premium
    • Pentesting Accounts
  • Modders Section
    • Source Codes
    • Manuals | Videos
    • Tools
    • Others
  • PRIV8-Section
    • Exploits
    • Accounts|Dumps
    • Crypter|Binder|Bots
    • Tutorials|Videos
    • Cracked Tools
    • Make Money
    • More Tools
    • Databeses
    • Ebooks
  • Pentesting Zone PRIV8
    • Pentesting Accounts
    • Reverse Engineering
    • Cracker Preview Area
  • Carding Zone PRIV8
    • Carding
    • Phishing
    • Defacing
    • Doxing
    • Special User Premium Preview Area
  • Recycle Bin
    • Recycle
  • Null3D's Nulled Group

Product Groups

  • PRIV8
  • Advertising
  • Access Basic
  • Seller
  • Services

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me

Found 6 results

  1. pwndbg (/poʊndbæg/) is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers. Why? Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing x/g30x $esp is not fun, and does not confer much information. The year is 2022 and GDB still lacks a real hexdump command! GDB's syntax is arcane and difficult to approach. Windbg users are completely lost when they occasionally need to bump into GDB. [hide][Hidden Content]]
  2. GEF – GDB Enhanced Features GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support). Feature One single GDB script. Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable in 2 seconds (unlike PwnDBG). Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible (unlike PwnDBG). Provides more than 50 commands to drastically change your experience in GDB. Easily extendable to create other commands by providing more comprehensible layout to GDB Python API. Works consistently on both Python2 and Python3. Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc. (unlike PEDA) Suited for real-life apps debugging, exploit development, just as much as CTF (unlike PEDA or PwnDBG) Changelog v2022.06 The unit testing structure has been re-designed to be more modular and flexible The documentation has been globally updated, moved from ReadTheDocs to GithubPages, and redesigned from mkdocs to mkdocs-material Countless (potential) errors were fixed thanks to more integration of type hinting Debugged file formats (such as ELF) now rely on a abstraction layer. This means GEF can transparently support more file formats including PE or MachO (see gef-extras/os) Remote support has been entirely rewritten and is now fully exposed via the gef.remote namespace. This includes the Qemu (user and system) support. Many commands, relying on external dependencies (such as cs-dis, asm or emulate) were transfered to GEF-Extras. Therefore, GEF now has absolutely no dependency whatsoever, not even optional ones. Refer to the deprecation page of the documentation for a complete overview of the changes. ida-interact has been totally removed and is now entirely of GEF-Extras only. It has also been rewritten to drop Python XMLRPC and relies on the much more advanced rpyc Python library. A new subcommand appeared, gef install which allows to install commands from gef-extras on the fly, if you cannot clone the repository or just need a one-time command. pcustom supports class factory allowing the structure(s) defined to collect information from the runtime Some improvements were added to the stack canary detection On a more personal note, this release marks the 10 years anniversary 🎂 since the first lines of GEF were written!! [hide][Hidden Content]]
  3. Modular visual interface for GDB in Python. This comes as a standalone single-file .gdbinit which, among the other things, enables a configurable dashboard showing the most relevant information during the program execution. Its main goal is to reduce the number of GDB commands issued to inspect the current program status allowing the programmer to focus on the control flow instead. Features Single GDB init file. Write the dashboard to the main GDB console or to an external file/TTY. Interaction with GDB using the native Python API. Several default modules are included to address the most basic needs: source code, assembly, registers, etc.). User-defined modules can be easily developed by extending a Python class. Additional configuration files (both GDB and Python) are read from ~/.gdbinit.d/. Fully stylable user interface and dynamic command prompt. Optional syntax highlighting using the Pygments Python library. No GDB command has been redefined, instead, all the features are available as subcommands of the main dashboard command. [hide][Hidden Content]]
  4. pwndbg (/poʊndbæg/) is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers. Pwndbg has a lot of useful features. You can a list of all available commands at any time by typing the pwndbgcommand. Here’s a small subset which is easy to capture in screenshots. [hide][Hidden Content]]
  5. GEF – GDB Enhanced Features GEF is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploiters and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. It has full support for both Python2 and Python3 indifferently (as more and more distros start pushing gdb compiled with Python3 support). Feature One single GDB script. Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable in 2 seconds (unlike PwnDBG). Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible (unlike PwnDBG). Provides more than 50 commands to drastically change your experience in GDB. Easily extendable to create other commands by providing more comprehensible layout to GDB Python API. Works consistently on both Python2 and Python3. Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc. (unlike PEDA) Suited for real-life apps debugging, exploit development, just as much as CTF (unlike PEDA or PwnDBG) Changelog GEF – v2021.10 Highlights of Impractical Information 93 commits, 5 Issues & 25 PRs closed Massive background re-work by @theguy147 , which includes (but not limited): Better and more CI tests More… [hide][Hidden Content]]
  6. peda PEDA – Python Exploit Development Assistance for GDB Key Features: Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help): aslr — Show/set ASLR setting of GDB checksec — Check for various security options of binary dumpargs — Display arguments passed to a function when stopped at a call instruction dumprop — Dump all ROP gadgets in the specific memory range elfheader — Get headers information from debugged ELF file elfsymbol — Get non-debugging symbol information from an ELF file lookup — Search for all addresses/references to addresses which belong to a memory range patch — Patch memory start at an address with string/hexstring/int pattern — Generate, search or write a cyclic pattern to memory procinfo — Display various info from /proc/pid/ pshow — Show various PEDA options and other settings pset — Set various PEDA options and other settings readelf — Get headers information from an ELF file ropgadget — Get common ROP gadgets of binary or library ropsearch — Search for ROP gadgets in memory searchmem|find — Search for a pattern in memory; support regex search shellcode — Generate or download common shellcodes. skeleton — Generate python exploit code template vmmap — Get virtual mapping address ranges of section(s) in debugged process xormem — XOR a memory region with a key Changelog v1.2 Bug fixes [hide][Hidden Content]]
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.