PEDA:-- Python Exploit Development Assistance for GDB.
by ziki - December 02, 2020 at 09:05 AM
1. Dereference memory trace

2. Basic support for ARMv7 and aarch64
    > register support
    > condition jump support
    > cpsr register support

3. Simple support for PPC and mipsel
    > register support

4. Recover armv7 dynamic symbol

5. Simple source code context
    > heap colorize

6. Syscall information in x86/x64

7. SROP information in x86/x64

Download Link:-
Thanks for sharing Python Exploit Development Assistance
I have seen this before thanks for posting! I got it back on my list!
thanks for share grat material
I've seen this around lol, but thank you I'll check it out

Possibly Related Threads…
Thread Author Replies Views Last Post
Python script for Webmin 1.910 exploit raidmale 0 1,021 November 08, 2019 at 06:06 AM
Last Post: raidmale
Annoying Popups Exploit - A browser exploit that open multiple windows + VIDEO kermer 0 668 October 13, 2019 at 12:26 PM
Last Post: kermer

 Users browsing this thread: 1 Guest(s)