⚕️
Stuff
search
⌘Ctrlk
⚕️
Stuff
  • 🤝Greetings
  • 📘CTF writeups
    • TryHackMe
    • HackTheBox
    • SKR
    • 3108 CTF
    • EQCTF
    • UMCS CTF
    • BBCTF
  • 🕸️PortSwigger (Web Academy)
    • Prototype Pollution
    • JWT
    • XSS
  • 📱Mobile Hacking Lab
    • Strings
  • ☠️Binary Exploitation
    • Stack
    • GDB Plugins
    • pwntools
  • 📰Cheatsheets & Article links
    • All Rounder
    • Web
    • Reverse Engineering
    • Active Directory
    • Linux
    • Binary Exploitation
    • Forensics
    • Intigriti-Monthly-Challenges
    • Miscellaneous / General
  • 🖼️LEKIR Framework writeups
    • Backdoor Exploiting
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. ☠️Binary Exploitation

GDB Plugins

You need to install GDB first before installing the plugins

pwndbg

LogoGitHub - pwndbg/pwndbg: Exploit Development and Reverse Engineering with GDB & LLDB Made EasyGitHubchevron-right
Pwndbg plugin

peda

LogoGitHub - longld/peda: PEDA - Python Exploit Development Assistance for GDBGitHubchevron-right
Peda plugin

gef

LogoGitHub - hugsy/gef: GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on LinuxGitHubchevron-right
gef plugin

Previous64-bitchevron-leftNextpwntoolschevron-right

Last updated 1 year ago