Port details |
- gef GDB Enhanced Features for exploit devs & reversers
- 2022.01_1 security =2 2022.01_1Version of this port present on the latest quarterly branch.
- Maintainer: 0mp@FreeBSD.org
- Port Added: 2020-03-02 16:28:09
- Last Update: 2023-06-27 19:34:34
- Commit Hash: 3d9a815
- People watching this port, also watch:: jdictionary, py311-Automat, py311-python-gdsii, py39-PyOpenGL, p5-Sane
- Also Listed In: python
- License: MIT
- WWW:
- https://gef.rtfd.io
- Description:
- GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS,
PowerPC and SPARC to assist exploit developers and reverse-engineers when using
old school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part of
regular GDB obscurity, avoiding repeating traditional commands, or bringing out
the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in GDB.
- Easily extendable to create other commands by providing more comprehensible
layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in any
GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC,
MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as CTF.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/security/gef/ && make install clean
- To add the package, run one of these commands:
- pkg install security/gef
- pkg install gef
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: gef
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1645393749
SHA256 (hugsy-gef-2022.01_GH0.tar.gz) = bb1070dfee440577927d7fa1aa5d310d9fb7297d87ffd786ee63cc6ae7f0f177
SIZE (hugsy-gef-2022.01_GH0.tar.gz) = 211779
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Runtime dependencies:
-
- gdb>7.7 : devel/gdb
- py39-capstone>0 : devel/py-capstone@py39
- py39-keystone-engine>0 : devel/py-keystone-engine@py39
- py39-ropper>0 : security/py-ropper@py39
- py39-unicorn>0 : emulators/py-unicorn@py39
- python3.9 : lang/python39
- There are no ports dependent upon this port
Configuration Options:
- ===> The following configuration options are available for gef-2022.01_1:
OPTIONALDEPS=on: Install optional dependencies for extra functionalities
===> Use 'make config' to modify these settings
- Options name:
- security_gef
- USES:
- python:run
- pkg-message:
- For install:
- Now that GEF is installed it can be used with gdb(1).
Run the following command in the gdb prompt to load the plugin:
```
source /usr/local/share/gef/gef.py
```
In order to load GEF automatically on gdb(1) launch add the line mentioned
above to ~/.gdbinit:
```
echo "source /usr/local/share/gef/gef.py" >> ~/.gdbinit
```
- Master Sites:
|
Number of commits found: 14
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
2022.01_1 27 Jun 2023 19:34:34 |
Rene Ladan (rene) |
all: remove explicit versions in USES=python for "3.x+"
The logic in USES=python will automatically convert this to 3.8+ by
itself.
Adjust two ports that only had Python 3.7 mentioned but build fine
on Python 3.8 too.
finance/quickfix: mark BROKEN with PYTHON
libtool: compile: c++ -DHAVE_CONFIG_H -I. -I../.. -I -I. -I.. -I../.. -I../C++
-DLIBICONV_PLUG -DPYTHON_MAJOR_VERSION=3 -Wno-unused-variable
-Wno-maybe-uninitialized -O2 -pipe -DLIBICONV_PLUG -fstack-protector-strong
-fno-strict-aliasing -DLIBICONV_PLUG -Wall -ansi
-Wno-unused-command-line-argument -Wpointer-arith -Wwrite-strings
-Wno-overloaded-virtual -Wno-deprecated-declarations -Wno-deprecated -std=c++0x
-MT _quickfix_la-QuickfixPython.lo -MD -MP -MF
.deps/_quickfix_la-QuickfixPython.Tpo -c QuickfixPython.cpp -fPIC -DPIC -o
.libs/_quickfix_la-QuickfixPython.o
warning: unknown warning option '-Wno-maybe-uninitialized'; did you mean
'-Wno-uninitialized'? [-Wunknown-warning-option]
QuickfixPython.cpp:175:11: fatal error: 'Python.h' file not found
^~~~~~~~~~
1 warning and 1 error generated.
Reviewed by: portmgr, vishwin, yuri
Differential Revision: <https://reviews.freebsd.org/D40568> |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
2022.01_1 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
2022.01_1 19 May 2022 13:50:36 |
Mateusz Piotrowski (0mp) |
security/gef: Do not depend on "python3" executable
Instead, use "pythonX.Y", as recommended by the ports framework.
MFH: 2022Q2 |
2022.01 20 Feb 2022 22:21:31 |
Mateusz Piotrowski (0mp) |
security/gef: Update to 2022.01
Changes: https://github.com/hugsy/gef/releases/tag/2022.01 |
2021.10 20 Oct 2021 09:46:18 |
Mateusz Piotrowski (0mp) |
security/gef: Update to 2021.10
Changes: https://github.com/hugsy/gef/releases/tag/2021.10 |
2021.07 06 Jul 2021 14:44:11 |
Mateusz Piotrowski (0mp) |
security/gef: Update to 2021.07 |
2021.04 15 Apr 2021 11:09:22 |
Mateusz Piotrowski (0mp) |
security/gef: Update to 2021.04
Release notes:
https://github.com/hugsy/gef/releases/tag/2021.04 |
2021.01 07 Apr 2021 08:09:01 |
Mathieu Arnold (mat) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
2021.01 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
2021.01 24 Jan 2021 16:30:30 |
0mp |
Update to 2021.01
Support for Python 2 has been dropped. |
2020.06 28 Jun 2020 11:16:13 |
0mp |
Update to 2020.06
Release notes:
https://github.com/hugsy/gef/releases/tag/2020.06 |
2020.03.1 10 Mar 2020 17:34:30 |
0mp |
Update to 2020.03-1
Release notes:
https://github.com/hugsy/gef/releases/tag/2020.03-1
Reported by: portscout |
2020.03 02 Mar 2020 16:28:02 |
0mp |
New port: security/gef
GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC
and SPARC to assist exploit developers and reverse-engineers when using old
school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part
of regular GDB obscurity, avoiding repeating traditional commands, or
bringing out the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in
GDB.
- Easily extendable to create other commands by providing more
comprehensible layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in
any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64,
SPARC, MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as
CTF.
WWW: https://gef.rtfd.io |
Number of commits found: 14
|