GEF
MIT🧬 Reverse Engineering · Python
GEF (GDB Enhanced Features) is a comprehensive GDB plugin that transforms the standard GNU Debugger into a modern, feature-rich environment tailored for exploit developers and reverse engineers working on Linux systems. It provides colorized disassembly, register displays, stack visualization, heap analysis, automatic breakpoint commands, and dozens of exploit-development-specific commands that dramatically improve the debugging workflow. Binary exploitation practitioners, malware analysts, and CTF players use GEF as their primary debugging interface because it surfaces critical information like memory mappings, pattern generation, format string helpers, and ROP gadget searching directly within the GDB session. GEF supports multiple architectures including x86, ARM, MIPS, PowerPC, and SPARC, and integrates with tools like Binary Ninja, IDA Pro, and pwntools through its Python API.
Tags
Details
- Category
- 🧬 Reverse Engineering
- Language
- Python
- Repository
- hugsy/gef
- License
- MIT
- Platforms
- 🐧linux🍎macos
Links
Community Reviews
No reviews yet. Be the first to review GEF.
Alternatives & Comparisons
More in Reverse Engineering
dnSpy
C#.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
C#Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
C++Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
C++/QtBinary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
PythonBinary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
C++Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.