New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature parity with GEF #30
Comments
I need to re-evaluate GEF since it has some new stuff since I did this last year. |
https://gef.readthedocs.io/en/master/commands/scan/ |
p2p added in this pull request is similar to "scan": #880 |
@nobodyisnobody let me know here if there's particular features you're interested in. |
Hi,
Ok thanks, I will think if I have some ideas of usefull things to add.
…--
Envoyé avec Tutanota, la boîte aux lettres sécurisée et sans publicité.
9 déc. 2022, 16:49 de ***@***.***:
@nobodyisnobody <https://github.com/nobodyisnobody>> let me know here if there's particular features you're interested in.
—
Reply to this email directly, > view it on GitHub <#30 (comment)>> , or > unsubscribe <https://github.com/notifications/unsubscribe-auth/ATBIBF6K6W6ZEMVNIYXMJYDWMOSNLANCNFSM4CDS26TQ>> .
You are receiving this because you were mentioned.> Message ID: > <pwndbg/pwndbg/issues/30/1344813235> @> github> .> com>
|
These can be enumerated easily via:
gdb --nx --nh --command gef/gef.py --ex 'gef'
capstone-disassemble -- Use capstone disassembly framework to disassemble code. (alias: cs-dis)capstone-disassemble -- Use capstone disassembly framework to disassemble code. (alias: cs-dis)checksec -- Checksec.sh (http://www.trapkit.de/tools/checksec.html) port.ctf-exploit-templater -- Generates a ready-to-use exploit template for CTF.pwntools
'spwn template
.dump-memory -- Dump chunks of memory into raw file on the filesystem. Dump file name template can be defined in GEF runtime configWon't implement, use the built-in
dump
command.entry
procinfo
gef-alias -- GEF defined aliasestarget remote
command. This command will automatically download the target binary in the local temporary directory (defaut /tmp) and then source it. Additionally, it will fetch all the /proc/PID/maps and loads all its information.pwndbg
, we do it better, and transparently.pwntools
to launchThis is provided by the
$ida
magic function, and the IDA module.telescope
command, like PEDA.pattern -- Metasploit-like pattern generation/searchpwndbg
and thesearch
functionality.info proc
, by giving an exhaustive description of theprocinfo
reset-cache -- Reset cache of all stored data.pwndbg
's cache management is automagic.search
.shellcode -- ShellcodeCommand uses @JonathanSalwan simple-yet-awesome shellcode API to download shellcodesWon't implement, use
binjitsu
.system -- Invoke an external command and display result.shell
.unicorn-emulate -- Unicorn emulate: Use Unicorn-Engine to emulate the behavior of the binary, without affecting the GDB runtime. By default the command will emulate only the next [ - ] instruction, but location and number of instruction can be changed via arguments to the command line. By default, it will emulate the next instruction from current PC. (alias: emulate)nearpc
.xfiles -- Shows all libraries (and sections) loaded by binary (Truth is out there).info files
orinfo sharedlibrary
orvmmap
.xinfo -- Get virtual section information for specific addressI- mplemented as
vmmap
.The text was updated successfully, but these errors were encountered: