gef - Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.

gef – Multi-Architecture GDB Enhanced Features for Exploiters & Reverse-Engineers.

GEF is aimed to be used mostly by exploiters and reverse-engineers. It provides additional features to GDB using the Python API to assist during the process of dynamic analysis or exploit development.mips64

GEF fully relies on GDB API and other Linux specific source of information (such as /proc/pid). As a consequence, some of the features might not work on custom or harden systems such as GrSec. It has fully support for Python2 and Python3 indifferently (as more and more distro start pushing gdb compiled with Python3 support).
GEF supports all the architecture supported by GDB :
– x86
– ARM
– MIPS
– PowerPC

Tested on
* x86-32/x86-64 (even though you should totally use gdb-peda (https://github.com/longld/peda) instead)
* armv6/armv7/armv8 (untested)
* mips32
* powerpc32/powerpc64
* sparc

# Tested on gdb 7.x / python 2.6 & 2.7 & 3.x

# To start: in gdb, type `source /path/to/gef.py

Download : Master.zip  | Clone URL
Source : https://github.com/hugsy