Skip to content

Commit

Permalink
SyntaxWarning: invalid escape sequence longld#177 fixed
Browse files Browse the repository at this point in the history
  • Loading branch information
punixcorn committed Jul 4, 2024
1 parent 84d38bd commit 8a7985f
Show file tree
Hide file tree
Showing 5 changed files with 88 additions and 915 deletions.
8 changes: 4 additions & 4 deletions README
Original file line number Diff line number Diff line change
Expand Up @@ -20,11 +20,11 @@ writing custom interactive Python GDB commands.

3. Installation
- Download
$ wget http://ropshell.com/peda/peda.tar.gz
- Unpack to HOME directory
$ tar zxvf peda.tar.gz
```
git clone https://github.com/punixcorn/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
```
- Append a line to ~/.gdbinit to load PEDA when GDB starts
$ echo "source ~/peda/peda.py" >> ~/.gdbinit

4. Usage
- List of available commands:
Expand Down
62 changes: 37 additions & 25 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,39 +1,51 @@
peda
====
# peda

PEDA - Python Exploit Development Assistance for GDB

## Key Features:
* Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
* Add commands to support debugging and exploit development (for a full list of commands use `peda help`):
* `aslr` -- Show/set ASLR setting of GDB
* `checksec` -- Check for various security options of binary
* `dumpargs` -- Display arguments passed to a function when stopped at a call instruction
* `dumprop` -- Dump all ROP gadgets in specific memory range
* `elfheader` -- Get headers information from debugged ELF file
* `elfsymbol` -- Get non-debugging symbol information from an ELF file
* `lookup` -- Search for all addresses/references to addresses which belong to a memory range
* `patch` -- Patch memory start at an address with string/hexstring/int
* `pattern` -- Generate, search, or write a cyclic pattern to memory
* `procinfo` -- Display various info from /proc/pid/
* `pshow` -- Show various PEDA options and other settings
* `pset` -- Set various PEDA options and other settings
* `readelf` -- Get headers information from an ELF file
* `ropgadget` -- Get common ROP gadgets of binary or library
* `ropsearch` -- Search for ROP gadgets in memory
* `searchmem|find` -- Search for a pattern in memory; support regex search
* `shellcode` -- Generate or download common shellcodes.
* `skeleton` -- Generate python exploit code template
* `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process
* `xormem` -- XOR a memory region with a key

- Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging.
- Add commands to support debugging and exploit development (for a full list of commands use `peda help`):
- `aslr` -- Show/set ASLR setting of GDB
- `checksec` -- Check for various security options of binary
- `dumpargs` -- Display arguments passed to a function when stopped at a call instruction
- `dumprop` -- Dump all ROP gadgets in specific memory range
- `elfheader` -- Get headers information from debugged ELF file
- `elfsymbol` -- Get non-debugging symbol information from an ELF file
- `lookup` -- Search for all addresses/references to addresses which belong to a memory range
- `patch` -- Patch memory start at an address with string/hexstring/int
- `pattern` -- Generate, search, or write a cyclic pattern to memory
- `procinfo` -- Display various info from /proc/pid/
- `pshow` -- Show various PEDA options and other settings
- `pset` -- Set various PEDA options and other settings
- `readelf` -- Get headers information from an ELF file
- `ropgadget` -- Get common ROP gadgets of binary or library
- `ropsearch` -- Search for ROP gadgets in memory
- `searchmem|find` -- Search for a pattern in memory; support regex search
- `shellcode` -- Generate or download common shellcodes.
- `skeleton` -- Generate python exploit code template
- `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process
- `xormem` -- XOR a memory region with a key

## Installation

git clone https://github.com/longld/peda.git ~/peda
- Python Deps

```sh
sudo pacman -S python-six # arch
sudo apt install python-siz # debian
```

- clone repository

```sh
git clone https://github.com/punixcorn/peda.git ~/peda
echo "source ~/peda/peda.py" >> ~/.gdbinit
echo "DONE! debug your program with gdb and enjoy"
```

## Screenshot

![start](http://i.imgur.com/P1BF5mp.png)

![pattern arg](http://i.imgur.com/W97OWRC.png)
Expand Down
1 change: 1 addition & 0 deletions lib/.gdb_history
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
q
Loading

0 comments on commit 8a7985f

Please sign in to comment.