LogoHackDB
RecentCategoryTagPricingSubmit
Sign In
LogoHackDB
Sign In

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates

LogoHackDB

The Ultimate Directory for Offensive Security

Resources
  • Recent
  • Category
  1. Home
  2. Items
  3. GEF
icon of GEF

GEF

GEF is a kick-ass set of commands for GDB to make it cool again for exploit dev and reverse engineering on X86, ARM, MIPS, PowerPC, and SPARC.

Visit WebsiteShare on X
image of GEF
Visit Website

Introduction

Back

Information

  • Publisher
    Admin
  • Websitehugsy.github.io
  • Created date03/31/2025
  • Published date03/31/2025

Categories

  • Reverse Engineering
  • Exploit Development

Tags

  • External

More Resources

  • Tag
  • Listing
    • Pricing
    • FAQ
    • Submit
    Pages
    • Home
    • Support
    • Sitemap
    • llms.txt
    Company
    • About Us
    • Privacy Policy
    • Terms of Service
    Copyright © 2026 All Rights Reserved.
    image of IronPE
    Exploit DevelopmentInfrastructure SecurityRed Team Operations
    Visit Website

    IronPE

    Details

    Rust-based Windows PE manual loader supporting x86/x64. Implements manual mapping, base relocations, and import resolution for memory-based execution.

    Internal
    image of Lab401
    Wireless SecurityPhysical SecurityRed Team OperationsReverse Engineering
    Visit Website

    Lab401

    Details

    Premier hardware store for offensive security, providing Flipper Zero, Proxmark, Hak5 tools, SDR equipment, and specialized RFID cloning hardware.

    WirelessPhysicalInternal
    image of KittySploit Framework
    Exploit DevelopmentReconnaissance
    Visit Website

    KittySploit Framework

    Details

    KittySploit is a modular exploitation framework featuring a web proxy and AI-powered analysis to help red teams automate recon and vulnerability research.

    ExternalOSINT

    GEF - GDB Enhanced Features

    GEF (pronounced ʤɛf - "Jeff") is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploit developers and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development.

    It requires Python 3, but gef-legacy can be used if Python 2 support is needed.

    Key features:

    • Architecture agnostic: GEF works on x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC.
    • Extensible: Easily create new commands using the GDB Python API.
    • Real-life debugging: Suited for exploit development, CTFs, and general debugging.
    • GEF-Extras: A collection of community-contributed commands.

    Use cases:

    • Exploit development: Analyze binaries, find vulnerabilities, and develop exploits.
    • Reverse engineering: Understand how programs work and identify potential security flaws.
    • CTFs: Solve challenges that require debugging and exploitation skills.