Exploit Development and Reverse Engineering with GDB Made Easy
-
Updated
Jun 7, 2024 - Python
Exploit Development and Reverse Engineering with GDB Made Easy
fork from gdb tarball(s) from opensource.apple.com
Reverse engineering tool for linux games
An assembly program that simulates an arithmetic calculator with the operations addition, subtraction, and integer division for two two-digit unsigned numbers. The program runs in a menu-based format until the user chooses exit.
🖥️ A tiny, customizable and extensible MCU-class 32-bit RISC-V soft-core CPU and microcontroller-like SoC written in platform-independent VHDL.
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
Reverse engineer and rewrite real mode DOS programs!
Collect crash (or UndefinedBehaviorSanitizer error) reports, triage, and estimate severity.
This repo contains templates for VSCode config files like c_cpp_properties.json , launch.json , tasks.json. This is specifically created for gcc / gdb /g++.
GEP (GDB Enhanced Prompt) - a GDB plug-in for GDB command prompt with fzf history search, fish-like autosuggestions, tab auto-completion with fzf, and more!
All-in-one script to build bleeding-edge-toolchain for ARM microcontrollers
Configuration-free text editor and IDE limited to VT100. Suitable for writing git commit messages, editing Markdown, config files, source code, viewing man pages and for quick edit-compile cycles when programming. Has syntax highlighting, jump-to-error, rainbow parentheses, macros, tab completion, cut/paste portals and a simple gdb front-end.
Add a description, image, and links to the gdb topic page so that developers can more easily learn about it.
To associate your repository with the gdb topic, visit your repo's landing page and select "manage topics."