ENNAENNA

PEDA

🧬 Reverse Engineering · Python

PEDA (Python Exploit Development Assistance) enhances GDB with colorized disassembly, register display, stack/memory examination, and exploit development utilities. It provides commands for pattern generation and offset finding, ROP gadget searching, shellcode development assistance, heap analysis, and format string helpers. PEDA automatically displays context (registers, code, stack) at each breakpoint, dramatically improving the debugging experience for binary exploitation. It supports both x86 and x86_64 architectures and integrates with the standard GDB workflow while adding powerful automation for common exploit development tasks.

6.1kstars
830forks
76issues
Updated 1y ago
+I use this

Installation

$ git clone https://github.com/longld/peda.git ~/peda && echo 'source ~/peda/peda.py' >> ~/.gdbinit

Use Cases

  • Binary exploit development with enhanced GDB
  • Finding ROP gadgets and building chains
  • Buffer overflow pattern offset calculation
  • Colorized debugging context at breakpoints

Tags

gdbexploit-developmentdebuggingbinary-exploitationrop

Community Reviews

More in Reverse Engineering