PEDA
🧬 Reverse Engineering · Python
PEDA (Python Exploit Development Assistance) enhances GDB with colorized disassembly, register display, stack/memory examination, and exploit development utilities. It provides commands for pattern generation and offset finding, ROP gadget searching, shellcode development assistance, heap analysis, and format string helpers. PEDA automatically displays context (registers, code, stack) at each breakpoint, dramatically improving the debugging experience for binary exploitation. It supports both x86 and x86_64 architectures and integrates with the standard GDB workflow while adding powerful automation for common exploit development tasks.
Installation
$ git clone https://github.com/longld/peda.git ~/peda && echo 'source ~/peda/peda.py' >> ~/.gdbinitUse Cases
- Binary exploit development with enhanced GDB
- Finding ROP gadgets and building chains
- Buffer overflow pattern offset calculation
- Colorized debugging context at breakpoints
Tags
Details
- Category
- 🧬 Reverse Engineering
- Language
- Python
- Repository
- longld/peda
- Platforms
- 🐧linux
Links
Community Reviews
Alternatives & Comparisons
Radare2
CPortable reversing framework. Disassembly, debugging, analysis, patching, and scripting in a single CLI.
Compare PEDA vs Radare2pwntools
PythonCTF framework and exploit development library for rapid prototyping of binary exploitation and reverse engineering.
Compare PEDA vs pwntoolsMore in Reverse Engineering
dnSpy
C#.NET debugger, decompiler, and assembly editor. Inspect and modify .NET and Unity assemblies without source code.
ILSpy
C#Open-source .NET decompiler and assembly browser. Produces clean C# from compiled binaries with cross-platform support.
x64dbg
C++Open-source x64/x32 debugger for Windows. Full-featured binary debugger with plugin ecosystem for malware analysis and reverse engineering.
Detect It Easy
C++/QtBinary packer and compiler detection. Identifies compilers, linkers, packers, and protectors used to build PE, ELF, and Mach-O files.
angr
PythonBinary analysis framework. Symbolic execution, CFG recovery, and vulnerability discovery for compiled binaries in Python.
RetDec
C++Retargetable decompiler by Avast. Converts machine code back to C from x86, ARM, MIPS, and PowerPC binaries.