Port details |
- gef GDB Enhanced Features for exploit devs & reversers
- 2022.01_1 security
=0 2022.01Version of this port present on the latest quarterly branch. - Maintainer: 0mp@FreeBSD.org
 - Port Added: 2020-03-02 16:28:09
- Last Update: 2022-05-19 13:50:36
- Commit Hash: 8bc0ccb
- Also Listed In: python
- License: MIT
- Description:
- GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS,
PowerPC and SPARC to assist exploit developers and reverse-engineers when using
old school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part of
regular GDB obscurity, avoiding repeating traditional commands, or bringing out
the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in GDB.
- Easily extendable to create other commands by providing more comprehensible
layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in any
GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC,
MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as CTF.
WWW: https://gef.rtfd.io
- SVNWeb : git : Homepage
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/security/gef/ && make install clean
- To add the package, run one of these commands:
- pkg install security/gef
- pkg install gef
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: gef
- Flavors: there is no flavor information for this port.
- distinfo:
- TIMESTAMP = 1645393749
SHA256 (hugsy-gef-2022.01_GH0.tar.gz) = bb1070dfee440577927d7fa1aa5d310d9fb7297d87ffd786ee63cc6ae7f0f177
SIZE (hugsy-gef-2022.01_GH0.tar.gz) = 211779
- Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Runtime dependencies:
-
- gdb>7.7 : devel/gdb
- py38-capstone>0 : devel/py-capstone@py38
- py38-keystone-engine>0 : devel/py-keystone-engine@py38
- py38-ropper>0 : security/py-ropper@py38
- py38-unicorn>0 : emulators/py-unicorn@py38
- python3.8 : lang/python38
- There are no ports dependent upon this port
- Configuration Options:
- ===> The following configuration options are available for gef-2022.01_1:
OPTIONALDEPS=on: Install optional dependencies for extra functionalities
===> Use 'make config' to modify these settings
- Options name:
- security_gef
- USES:
- python:run,3.6+
- pkg-message:
- For install:
- Now that GEF is installed it can be used with gdb(1).
Run the following command in the gdb prompt to load the plugin:
```
source /usr/local/share/gef/gef.py
```
In order to load GEF automatically on gdb(1) launch add the line mentioned
above to ~/.gdbinit:
```
echo "source /usr/local/share/gef/gef.py" >> ~/.gdbinit
```
- Master Sites:
|
Number of commits found: 11
Commit History - (may be incomplete: see SVNWeb link above for full details) |
Date | By | Description |
19 May 2022 13:50:36 2022.01_1
|
Mateusz Piotrowski (0mp)  |
security/gef: Do not depend on "python3" executable
Instead, use "pythonX.Y", as recommended by the ports framework.
MFH: 2022Q2 |
20 Feb 2022 22:21:31 2022.01
|
Mateusz Piotrowski (0mp)  |
security/gef: Update to 2022.01
Changes: https://github.com/hugsy/gef/releases/tag/2022.01 |
20 Oct 2021 09:46:18 2021.10
|
Mateusz Piotrowski (0mp)  |
security/gef: Update to 2021.10
Changes: https://github.com/hugsy/gef/releases/tag/2021.10 |
06 Jul 2021 14:44:11 2021.07
|
Mateusz Piotrowski (0mp)  |
security/gef: Update to 2021.07 |
15 Apr 2021 11:09:22 2021.04
|
Mateusz Piotrowski (0mp)  |
security/gef: Update to 2021.04
Release notes:
https://github.com/hugsy/gef/releases/tag/2021.04 |
07 Apr 2021 08:09:01 2021.01
|
Mathieu Arnold (mat)  |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
06 Apr 2021 14:31:07 2021.01
|
Mathieu Arnold (mat)  |
Remove # $FreeBSD$ from Makefiles. |
24 Jan 2021 16:30:30
2021.01
|
0mp  |
Update to 2021.01
Support for Python 2 has been dropped. |
28 Jun 2020 11:16:13
2020.06
|
0mp  |
Update to 2020.06
Release notes:
https://github.com/hugsy/gef/releases/tag/2020.06 |
10 Mar 2020 17:34:30
2020.03.1
|
0mp  |
Update to 2020.03-1
Release notes:
https://github.com/hugsy/gef/releases/tag/2020.03-1
Reported by: portscout |
02 Mar 2020 16:28:02
2020.03
|
0mp  |
New port: security/gef
GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC
and SPARC to assist exploit developers and reverse-engineers when using old
school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part
of regular GDB obscurity, avoiding repeating traditional commands, or
bringing out the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in
GDB.
- Easily extendable to create other commands by providing more
comprehensible layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in
any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64,
SPARC, MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as
CTF.
WWW: https://gef.rtfd.io |
Number of commits found: 11
|