peda的帮助文档(自己翻译)

翻译 2016年05月31日 20:14:14

aslr – Show/set ASLR setting of GDB
展示/设置GDB的ASLR(address space layout randomization,通过对堆,栈,共享库映射等线性区布局随机化)
asmsearch – Search for ASM instructions in memory
在内存中搜索汇编指令
assemble – On the fly assemble and execute instructions using NASM
checksec – Check for various security options of binary
检查二进制文件各种安全选项
cmpmem – Compare content of a memory region with a file
用一个文件来比较一个内存区域的内容
context – Display various information of current execution context
展示现在执行文本的不同信息
context_code – Display nearby disassembly at $PC of current execution context
对现在执行文件的汇编代码反汇编
context_register – Display register information of current execution context
展示寄存器信息
context_stack – Display stack of current execution context
展示栈
crashdump – Display crashdump info and save to file
展示故障存储信息和保存到文件中
deactive – Bypass a function by ignoring its execution (eg sleep/alarm)
绕过一个函数通过忽略它的执行
distance – Calculate distance between two addresses
计算两个地址之间的距离
dumpargs – Display arguments passed to a function when stopped at a call instruction
在停留在一个call指令时,展示传递给函数的各参数
dumpmem – Dump content of a memory region to raw binary file
导出一个内存区域内容到一个二进制文件
dumprop – Dump all ROP gadgets in specific memory range
导出所有的ROP gadgets在一个特别的内存范围
eflags – Display/set/clear value of eflags register
展示/设置/清除 elfags寄存器的值
elfheader – Get headers information from debugged ELF file
获得ELF的头部信息
elfsymbol – Get non-debugging symbol information from an ELF file
获取ELF反调试标志信息
gennop – Generate abitrary length NOP sled using given characters
使用给予的字符生成任意长度的NOP
getfile – Get exec filename of current debugged process
获取文件名
getpid – Get PID of current debugged process
获得PID
goto – Continue execution at an address
继续执行
help – Print the usage manual for PEDA commands
帮助信息
hexdump – Display hex/ascii dump of data in memory
展示内存中数据的十六进制/ASCII
hexprint – Display hexified of data in memory
jmpcall – Search for JMP/CALL instructions in memory
在内存中查询JMP/CALL指令
loadmem – Load contents of a raw binary file to memory
把一个二进制文件加载到内存中
lookup – Search for all addresses/references to addresses which belong to a memory range
查询一个内存范围的所有的地址和参考地址
nearpc – Disassemble instructions nearby current PC or given address
nextcall – Step until next ‘call’ instruction in specific memory range
nextjmp – Step until next ‘j*’ instruction in specific memory range
nxtest – Perform real NX test to see if it is enabled/supported by OS
patch – Patch memory start at an address with string/hexstring/int
pattern – Generate, search, or write a cyclic pattern to memory
pattern_arg – Set argument list with cyclic pattern
pattern_create – Generate a cyclic pattern
pattern_env – Set environment variable with a cyclic pattern
pattern_offset – Search for offset of a value in cyclic pattern
pattern_patch – Write a cyclic pattern to memory
pattern_search – Search a cyclic pattern in registers and memory
payload – Generate various type of ROP payload using ret2plt
pdisass – Format output of gdb disassemble command with colors
pltbreak – Set breakpoint at PLT functions match name regex
procinfo – Display various info from /proc/pid/
profile – Simple profiling to count executed instructions in the program
pyhelp – Wrapper for python built-in help
readelf – Get headers information from an ELF file
refsearch – Search for all references to a value in memory ranges
reload – Reload PEDA sources, keep current options untouch
ropgadget – Get common ROP gadgets of binary or library
ropsearch – Search for ROP gadgets in memory
searchmem – Search for a pattern in memory; support regex search
session – Save/restore a working gdb session to file as a script
set – Set various PEDA options and other settings
sgrep – Search for full strings contain the given pattern
shellcode – Generate or download common shellcodes.
show – Show various PEDA options and other settings
skeleton – Generate python exploit code template
skipi – Skip execution of next count instructions
snapshot – Save/restore process’s snapshot to/from file
start – Start debugged program and stop at most convenient entry
stepuntil – Step until a desired instruction in specific memory range
strings – Display printable strings in memory
substr – Search for substrings of a given string/number in memory
telescope – Display memory content at an address with smart dereferences
tracecall – Trace function calls made by the program
traceinst – Trace specific instructions executed by the program
unptrace – Disable anti-ptrace detection
utils – Miscelaneous utilities from utils module
vmmap – Get virtual mapping address ranges of section(s) in debugged process
waitfor – Try to attach to new forked process; mimic “attach -waitfor”
xinfo – Display detail information of address/registers
xormem – XOR a memory region with a key
xprint – Extra support to GDB’s print command
xrefs – Search for all call/data access references to a function/variable
交叉引用
xuntil – Continue execution until an address or function

相关文章推荐

GDB实用插件(peda, gef, gdbinit)全解

======= CSDN GitHub GDB插件使用插件(peda, gef, gdbinit)全解 AderXCoding/system/tools/yaffs2 本作品采用知识共...
  • gatieme
  • gatieme
  • 2017年03月18日 14:48
  • 4561

编写poc和exploit的几款常用工具介绍

1.pwntools pwntools是一个CTF框架和漏洞利用开发库,用Python开发,由rapid设计,旨在让使用者简单快速的编写exploit。 pwntools对Ubuntu 12.0...
  • koozxcv
  • koozxcv
  • 2016年06月12日 11:30
  • 5975

gdb学习笔记

调试没有调试信息的程序 gdb ./stkof 查看入口点: (gdb) info file 显示入口地址为0x400840 在入口地址下断: b *0x400840 运行: r 查看接下来要执行...
  • szhhck
  • szhhck
  • 2015年04月21日 15:18
  • 4022

安装peda

peda是gdb的一个插件,安装后大大提升gdb在分析逆向/溢出程序时的用户体验。...
  • p0x1307
  • p0x1307
  • 2015年06月09日 10:41
  • 5366

PEDA用法总结

PEDA用法总结 一个强大的GDB插件  PEDA是为GDB设计的一个强大的插件,全称是Python Exploit Development Assistance for GDB。它提供了很多人性化的...

linux常见漏洞利用技术实践

这篇文章好像被很多人转载,以至于我都不能找到谁的才是原创,因此就不加原创链接了。个人感觉,对于pwn入门的人来说很有启发意义,这套工具,方法理论移植到android平台其实差别不大,android平台...
  • koozxcv
  • koozxcv
  • 2016年06月14日 11:27
  • 5492

漏洞挖局利器-Fuzz技术介绍

模糊测试的定义模糊测试定义为“通过向应用提供非预期的输入并监控输出中的异常来发现软件中的故障(faults)的方法”。 典型而言,模糊测试利用自动化或是半自动化的方法重复地向应用提供输入。显然,上述...

模型汇总16 各类Seq2Seq模型对比及《Attention Is All You Need》中技术详解

1、已有Seq2Seq模型 Seq2Seq模型是处理序列到序列问题的利器,尤其是在神经网络翻译(NMT)方面,取得了很大的成功。Seq2Seq由一个encoder和一个decoder构成,encode...

peda 官方帮助文档

PEDA (Python Exploit Development Assistance)官方帮助文档 PEDA是GDB的一个插件 广泛用于调试CTF的PWN题目...

PhoneGap API帮助文档翻译—Media(媒体)

PhoneGap API帮助文档翻译—Media(媒体) “   Media对象提供录制和回放设备上的音频文件的能力。 var medi...
内容举报
返回顶部
收藏助手
不良信息举报
您举报文章:peda的帮助文档(自己翻译)
举报原因:
原因补充:

(最多只允许输入30个字)