PEDA:-- Python Exploit Development Assistance for GDB.
by ziki - December 02, 2020 at 09:05 AM
#1
Enhancements:-
1. Dereference memory trace

2. Basic support for ARMv7 and aarch64
    > register support
    > condition jump support
    > cpsr register support

3. Simple support for PPC and mipsel
    > register support

4. Recover armv7 dynamic symbol

5. Simple source code context
    > heap colorize

6. Syscall information in x86/x64


7. SROP information in x86/x64


Download Link:-

https://github.com/0xKira/peda
Reply
#2
Thanks for sharing Python Exploit Development Assistance
Reply
#3
I have seen this before thanks for posting! I got it back on my list!
Reply
#4
thanks for share grat material
Reply
#5
I've seen this around lol, but thank you I'll check it out
Reply

Possibly Related Threads…
Thread Author Replies Views Last Post
Python script for Webmin 1.910 exploit raidmale 0 1,021 November 08, 2019 at 06:06 AM
Last Post: raidmale
Annoying Popups Exploit - A browser exploit that open multiple windows + VIDEO kermer 0 668 October 13, 2019 at 12:26 PM
Last Post: kermer

 Users browsing this thread: 1 Guest(s)