peda的帮助文档(自己翻译)
来源:互联网 发布:知乎武汉船用机械 编辑:程序博客网 时间:2024/05/22 12:24
aslr – Show/set ASLR setting of GDB
展示/设置GDB的ASLR(address space layout randomization,通过对堆,栈,共享库映射等线性区布局随机化)
asmsearch – Search for ASM instructions in memory
在内存中搜索汇编指令
assemble – On the fly assemble and execute instructions using NASM
checksec – Check for various security options of binary
检查二进制文件各种安全选项
cmpmem – Compare content of a memory region with a file
用一个文件来比较一个内存区域的内容
context – Display various information of current execution context
展示现在执行文本的不同信息
context_code – Display nearby disassembly at $PC of current execution context
对现在执行文件的汇编代码反汇编
context_register – Display register information of current execution context
展示寄存器信息
context_stack – Display stack of current execution context
展示栈
crashdump – Display crashdump info and save to file
展示故障存储信息和保存到文件中
deactive – Bypass a function by ignoring its execution (eg sleep/alarm)
绕过一个函数通过忽略它的执行
distance – Calculate distance between two addresses
计算两个地址之间的距离
dumpargs – Display arguments passed to a function when stopped at a call instruction
在停留在一个call指令时,展示传递给函数的各参数
dumpmem – Dump content of a memory region to raw binary file
导出一个内存区域内容到一个二进制文件
dumprop – Dump all ROP gadgets in specific memory range
导出所有的ROP gadgets在一个特别的内存范围
eflags – Display/set/clear value of eflags register
展示/设置/清除 elfags寄存器的值
elfheader – Get headers information from debugged ELF file
获得ELF的头部信息
elfsymbol – Get non-debugging symbol information from an ELF file
获取ELF反调试标志信息
gennop – Generate abitrary length NOP sled using given characters
使用给予的字符生成任意长度的NOP
getfile – Get exec filename of current debugged process
获取文件名
getpid – Get PID of current debugged process
获得PID
goto – Continue execution at an address
继续执行
help – Print the usage manual for PEDA commands
帮助信息
hexdump – Display hex/ascii dump of data in memory
展示内存中数据的十六进制/ASCII
hexprint – Display hexified of data in memory
jmpcall – Search for JMP/CALL instructions in memory
在内存中查询JMP/CALL指令
loadmem – Load contents of a raw binary file to memory
把一个二进制文件加载到内存中
lookup – Search for all addresses/references to addresses which belong to a memory range
查询一个内存范围的所有的地址和参考地址
nearpc – Disassemble instructions nearby current PC or given address
nextcall – Step until next ‘call’ instruction in specific memory range
nextjmp – Step until next ‘j*’ instruction in specific memory range
nxtest – Perform real NX test to see if it is enabled/supported by OS
patch – Patch memory start at an address with string/hexstring/int
pattern – Generate, search, or write a cyclic pattern to memory
pattern_arg – Set argument list with cyclic pattern
pattern_create – Generate a cyclic pattern
pattern_env – Set environment variable with a cyclic pattern
pattern_offset – Search for offset of a value in cyclic pattern
pattern_patch – Write a cyclic pattern to memory
pattern_search – Search a cyclic pattern in registers and memory
payload – Generate various type of ROP payload using ret2plt
pdisass – Format output of gdb disassemble command with colors
pltbreak – Set breakpoint at PLT functions match name regex
procinfo – Display various info from /proc/pid/
profile – Simple profiling to count executed instructions in the program
pyhelp – Wrapper for python built-in help
readelf – Get headers information from an ELF file
refsearch – Search for all references to a value in memory ranges
reload – Reload PEDA sources, keep current options untouch
ropgadget – Get common ROP gadgets of binary or library
ropsearch – Search for ROP gadgets in memory
searchmem – Search for a pattern in memory; support regex search
session – Save/restore a working gdb session to file as a script
set – Set various PEDA options and other settings
sgrep – Search for full strings contain the given pattern
shellcode – Generate or download common shellcodes.
show – Show various PEDA options and other settings
skeleton – Generate python exploit code template
skipi – Skip execution of next count instructions
snapshot – Save/restore process’s snapshot to/from file
start – Start debugged program and stop at most convenient entry
stepuntil – Step until a desired instruction in specific memory range
strings – Display printable strings in memory
substr – Search for substrings of a given string/number in memory
telescope – Display memory content at an address with smart dereferences
tracecall – Trace function calls made by the program
traceinst – Trace specific instructions executed by the program
unptrace – Disable anti-ptrace detection
utils – Miscelaneous utilities from utils module
vmmap – Get virtual mapping address ranges of section(s) in debugged process
waitfor – Try to attach to new forked process; mimic “attach -waitfor”
xinfo – Display detail information of address/registers
xormem – XOR a memory region with a key
xprint – Extra support to GDB’s print command
xrefs – Search for all call/data access references to a function/variable
交叉引用
xuntil – Continue execution until an address or function
- peda的帮助文档(自己翻译)
- peda 官方帮助文档
- 再发自己的翻译的《Directshow(SDK)帮助文档 ---------智慧的鱼
- patch的man帮助文档的翻译
- 关于DirectX帮助文档翻译的事情
- diff的man帮助文档翻译
- QtXml帮助文档翻译
- EMF帮助文档翻译
- QSettings帮助文档翻译
- 【翻译】关于对IDEA-Project的官方帮助文档翻译
- hibernate翻译文档(自己写的希望更正)
- Myeclipse文档注释如何提炼(导出)成自己的API帮助文档?
- Tomcat帮助文档翻译(未完成)
- cmdlet帮助文档翻译说明
- CreateInstall5.7.2 帮助文档翻译
- PhoneGap API帮助文档翻译
- MATLAB帮助文档翻译小结
- LDTP帮助文档翻译版
- CF_602A - Two Bases(进制转换—水题)
- android.support.v7.widget.SearchView开发记录(一)
- 练习三 Problem T
- 在Android应用中使用自定义证书的HTTPS连接(下)
- HTML5+CSS3-第二节(浏览器前缀、css新特征、文本溢出、新的颜色设定、透明设定、文本填充色、文本边框色、圆角)
- peda的帮助文档(自己翻译)
- Guice 注入--(privateModule,intall(),expose())
- OC视频教程29课-第01讲 Classes
- hdu1151(二分图最大独立集)
- android-----Volley框架使用ImageLoader加载图片源码分析
- HDU 4568 Hunter
- 工资数组类
- PyQt基础第4篇——导入图片资源
- ofbiz详解(Java开放电子商务平台)