About 15,500 results
Open links in new tab
  1. Run a python command with "run" on GDB

    A common solution is to redirect your input from a file. You first need to run the script and save the result: python -c "print 'A'*50" > my_file and redirect it to gdb run. r < my_file also, from the …

  2. Decent GUI for GDB - Reverse Engineering Stack Exchange

    I started my own gdb frontend called gdbgui which is a server (in python) that lets you access a full-featured frontend in your browser. Install pip install gdbgui --upgrade or download at …

  3. Set gdb breakpoint by address with gdb python

    Jan 22, 2021 · You just need to prefix the address with a '*', like when using break. For example: (gdb) python >gdb.Breakpoint('*0x080487ff') >end Breakpoint 1 at 0x80487ff (gdb)

  4. How to get a full execution trace with Python gdb?

    The use of Python appears to be incidental, except that you're using Python inside of GDB. GDB has native support for instruction tracing, via the record command. Using the command record …

  5. GDB - Send Python output to the program after SIGINT

    Apr 5, 2020 · I am trying to learn GDB to better understand buffer overflows but I can't find an answer to my problem which is how can I send a Python-generated output to the program …

  6. Run a python in command (kali) with "run" on gdb-peda$

    Feb 19, 2022 · While debugging a program under gdb with gdb-peda installed, I need to pass args to the binary using output from something like python. Why I am not getting AAAAA? gdb …

  7. Adding Types to GDB via Python - Reverse Engineering Stack …

    GDB has a reasonably robust API which is exposed to Python at runtime. It allows for inspecting various types, but does not appear to allow creation of types. However, types can be manually …

  8. linux - Managing inputs for payload injection? - Reverse …

    Nov 14, 2016 · I am looking for a complete list of the ways to inject a payload in a vulnerable program in a Unix (Linux) context depending on the inputs opened by the program. I know that …

  9. x86-64 bit Buffer Overflow, help with overwriting %rip

    gdb$ run $(python -c 'print "S"*10 + "A"*254 + "\x7f\xff\xff\xff\xd8\xc0"[::-1]') and now something I don't understand happens: Despite the fact, that I write exactly the same amount of characters …

  10. Basic question: how to input non-printable hex values in GDB / NC?

    May 17, 2018 · I've seen examples online where python is used to supply hex values as the argument to the binary - but this particular binary runs, prints a query message, THEN expects …