PEDA


GitHub Repository

Installation

git clone https://github.com/longld/peda.git ~/Repositories/peda    # clone PEDA repository
echo "source ~/Repositories/peda/peda.py" >> ~/.gdbinit             # make GDB load PEDA

Commands

aslr        # Show/set ASLR setting of GDB
checksec    # Check for various security options of binary
dumpargs    # Display arguments passed to a function when stopped at a call instruction
dumprop     # Dump all ROP gadgets in specific memory range
elfheader   # Get headers information from debugged ELF file
elfsymbol   # Get non-debugging symbol information from an ELF file
lookup      # Search for all addresses/references to addresses which belong to a memory range
patch       # Patch memory start at an address with string/hexstring/int
pattern     # Generate, search, or write a cyclic pattern to memory
procinfo    # Display various info from /proc/pid/
pshow       # Show various PEDA options and other settings
pset        # Set various PEDA options and other settings
readelf     # Get headers information from an ELF file
ropgadget   # Get common ROP gadgets of binary or library
ropsearch   # Search for ROP gadgets in memory
shellcode   # Generate or download common shellcodes.
skeleton    # Generate python exploit code template
vmmap       # Get virtual mapping address ranges of section(s) in debugged process
xormem      # XOR a memory region with a key
find        # Search for a pattern in memory; support regex search