GEF - GDB Enhanced Features
GEF
(pronounced ʤɛf - "Jeff") is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploit developers and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development.
It requires Python 3, but gef-legacy
can be used if Python 2 support is needed.
Key features:
- Architecture agnostic: GEF works on x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC.
- Extensible: Easily create new commands using the GDB Python API.
- Real-life debugging: Suited for exploit development, CTFs, and general debugging.
- GEF-Extras: A collection of community-contributed commands.
Use cases:
- Exploit development: Analyze binaries, find vulnerabilities, and develop exploits.
- Reverse engineering: Understand how programs work and identify potential security flaws.
- CTFs: Solve challenges that require debugging and exploitation skills.