{"id":13395892,"url":"https://github.com/longld/peda","last_synced_at":"2025-05-13T23:08:04.853Z","repository":{"id":4166658,"uuid":"5282021","full_name":"longld/peda","owner":"longld","description":"PEDA - Python Exploit Development Assistance for GDB","archived":false,"fork":false,"pushed_at":"2024-07-29T08:32:28.000Z","size":289,"stargazers_count":5977,"open_issues_count":74,"forks_count":814,"subscribers_count":198,"default_branch":"master","last_synced_at":"2025-04-02T00:17:48.661Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/longld.png","metadata":{"files":{"readme":"README","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2012-08-03T06:26:41.000Z","updated_at":"2025-04-01T19:39:24.000Z","dependencies_parsed_at":"2024-10-29T10:57:33.410Z","dependency_job_id":null,"html_url":"https://github.com/longld/peda","commit_stats":{"total_commits":83,"total_committers":29,"mean_commits":"2.8620689655172415","dds":0.7108433734939759,"last_synced_commit":"84d38bda505941ba823db7f6c1bcca1e485a2d43"},"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/longld%2Fpeda","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/longld%2Fpeda/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/longld%2Fpeda/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/longld%2Fpeda/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/longld","download_url":"https://codeload.github.com/longld/peda/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247953848,"owners_count":21024100,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-30T18:00:35.115Z","updated_at":"2025-04-09T01:21:35.935Z","avatar_url":"https://github.com/longld.png","language":"Python","readme":"PEDA - Python Exploit Development Assistance for GDB\n\nVersion: 1.0\n\nRelease: special public release, Black Hat USA 2012\n\n0. Credits\n    - Huy Phan (pdah) for reviewing code\n\n1. Introduction\nPEDA is a Python GDB script with many handy commands to help speed up \nexploit development process on Linux/Unix. It is also a framework for \nwriting custom interactive Python GDB commands.\n\n2. Requirements\n    - PEDA 1.0 is only support Linux\n    - GDB 7.x\n    - Python 2.6+\n    - Utilities: nasm, readelf, objdump\n\n3. Installation\n    - Download\n        $ wget http://ropshell.com/peda/peda.tar.gz\n    - Unpack to HOME directory\n        $ tar zxvf peda.tar.gz\n    - Append a line to ~/.gdbinit to load PEDA when GDB starts\n        $ echo \"source ~/peda/peda.py\" \u003e\u003e ~/.gdbinit\n\n4. Usage\n    - List of available commands:\n        gdb-peda$ peda help\n\n    - Search for some commands:\n        gdb-peda$ apropos \u003ckeyword\u003e\n        gdb-peda$ help \u003ckeyword\u003e\n\n    - Get usage manual of specific command:\n        gdb-peda$ phelp \u003ccommand\u003e\n        gdb-peda$ help \u003ccommand\u003e\n\n    - Get/set config option:\n        gdb-peda$ pshow option\n        gdb-peda$ pset option \u003cname\u003e \u003cvalue\u003e\n\n\n","funding_links":[],"categories":["[*] System hacking / Pwnable","Tools","Debugging and Reverse Engineering","Reversing","Python","Exploit Development Tools","\u003ca id=\"683b645c2162a1fce5f24ac2abfa1973\"\u003e\u003c/a\u003e漏洞\u0026\u0026漏洞管理\u0026\u0026漏洞发现/挖掘\u0026\u0026漏洞开发\u0026\u0026漏洞利用\u0026\u0026Fuzzing","\u003ca id=\"975d9f08e2771fccc112d9670eae1ed1\"\u003e\u003c/a\u003eGDB","Reverse Engineering","Reverse Engineering Tools","Awesome Penetration Testing (\"https://github.com/Muhammd/Awesome-Pentest\")","Programming/Comp Sci/SE Things"],"sub_categories":["[+] TIP \u0026 Tools  :+1:","Essential Tools","Other Resources","Reverse Engineering Tools","Zealandia","\u003ca id=\"605b1b2b6eeb5138cb4bc273a30b28a5\"\u003e\u003c/a\u003e漏洞开发","Forensics","\u003ca id=\"5f4381b0a90d88dd2296c2936f7e7f70\"\u003e\u003c/a\u003e工具","Malware Articles and Sources","Penetration Testing Report Templates","Online Resources","Record and Replay"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flongld%2Fpeda","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Flongld%2Fpeda","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Flongld%2Fpeda/lists"}