LogoHackDB
icon of GEF

GEF

GEF is a kick-ass set of commands for GDB to make it cool again for exploit dev and reverse engineering on X86, ARM, MIPS, PowerPC, and SPARC.

Introduction

GEF - GDB Enhanced Features

GEF (pronounced ʤɛf - "Jeff") is a kick-ass set of commands for X86, ARM, MIPS, PowerPC and SPARC to make GDB cool again for exploit dev. It is aimed to be used mostly by exploit developers and reverse-engineers, to provide additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development.

It requires Python 3, but gef-legacy can be used if Python 2 support is needed.

Key features:

  • Architecture agnostic: GEF works on x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC.
  • Extensible: Easily create new commands using the GDB Python API.
  • Real-life debugging: Suited for exploit development, CTFs, and general debugging.
  • GEF-Extras: A collection of community-contributed commands.

Use cases:

  • Exploit development: Analyze binaries, find vulnerabilities, and develop exploits.
  • Reverse engineering: Understand how programs work and identify potential security flaws.
  • CTFs: Solve challenges that require debugging and exploitation skills.

Information

Newsletter

Join the Community

Subscribe to our newsletter for the latest news and updates