This is the Windows app named peda whose latest release can be downloaded as v1.2.zip. It can be run online in the free hosting provider OnWorks for workstations.
Download and run online this app named peda with OnWorks for free.
Follow these instructions in order to run this app:
- 1. Downloaded this application in your PC.
- 2. Enter in our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 3. Upload this application in such filemanager.
- 4. Start any OS OnWorks online emulator from this website, but better Windows online emulator.
- 5. From the OnWorks Windows OS you have just started, goto our file manager https://www.onworks.net/myfiles.php?username=XXXXX with the username that you want.
- 6. Download the application and install it.
- 7. Download Wine from your Linux distributions software repositories. Once installed, you can then double-click the app to run them with Wine. You can also try PlayOnLinux, a fancy interface over Wine that will help you install popular Windows programs and games.
Wine is a way to run Windows software on Linux, but with no Windows required. Wine is an open-source Windows compatibility layer that can run Windows programs directly on any Linux desktop. Essentially, Wine is trying to re-implement enough of Windows from scratch so that it can run all those Windows applications without actually needing Windows.
SCREENSHOTS
Ad
peda
DESCRIPTION
Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. Add commands to support debugging and exploit development (for a full list of commands use peda help). Display arguments passed to a function when stopped at a call instruction. Search for all addresses/references to addresses which belong to a memory range. Generate or download common shellcodes. Generate python exploit code template. Get virtual mapping address ranges of section(s) in debugged process. XOR a memory region with a key.
Features
- Show/set ASLR setting of GDB
- Check for various security options of binary
- Dump all ROP gadgets in specific memory range
- Get headers information from debugged ELF file
- Get non-debugging symbol information from an ELF file
- Patch memory start at an address with string/hexstring/int
- Generate, search, or write a cyclic pattern to memory
Programming Language
Python
This is an application that can also be fetched from https://sourceforge.net/projects/peda.mirror/. It has been hosted in OnWorks in order to be run online in an easiest way from one of our free Operative Systems.