p3da
p3da copied to clipboard
P3DA - Python3 Exploit Development Assistance for GDB
``` minishwoods ~/Downloads » gdb /bin/ls -q Reading symbols from /bin/ls...(no debugging symbols found)...done. gdb-peda$ pattern create 1024 Generate, search, or write a cyclic pattern to memory Set "pattern" option...
Couldn't get it to generate shellcode, shellcode search gave me an error too.
It generates an empty file ``` gdb-peda$ skeleton argv level1-exploit.py Writing skeleton code to file "level1-exploit.py" gdb-peda$ quit $ ls -la level1-exploit.py -rw-rw-r-- 1 olivier olivier 0 Mar 29 15:18...
``` sh gdb-peda$ ropsearch "inc rax" 0 0xffffffffffffffffffffffffffffff Searching for ROP gadget: 'inc rax' in range: 0x0 - 0xffffffffffffffffffffffffffffff Search for ROP gadgets in memory Note: only for simple gadgets,...