From 8a7985f971b255931ea38ea83bbe736ec07f2e45 Mon Sep 17 00:00:00 2001 From: punixcorn Date: Thu, 4 Jul 2024 04:05:44 +0000 Subject: [PATCH 1/6] SyntaxWarning: invalid escape sequence #177 fixed --- README | 8 +- README.md | 62 ++-- lib/.gdb_history | 1 + lib/six.py | 838 ----------------------------------------------- peda.py | 94 +++--- 5 files changed, 88 insertions(+), 915 deletions(-) create mode 100644 lib/.gdb_history delete mode 100644 lib/six.py diff --git a/README b/README index d759b17..3017132 100644 --- a/README +++ b/README @@ -20,11 +20,11 @@ writing custom interactive Python GDB commands. 3. Installation - Download - $ wget http://ropshell.com/peda/peda.tar.gz - - Unpack to HOME directory - $ tar zxvf peda.tar.gz + ``` + git clone https://github.com/punixcorn/peda + echo "source ~/peda/peda.py" >> ~/.gdbinit + ``` - Append a line to ~/.gdbinit to load PEDA when GDB starts - $ echo "source ~/peda/peda.py" >> ~/.gdbinit 4. Usage - List of available commands: diff --git a/README.md b/README.md index 8878ab1..5d84de2 100644 --- a/README.md +++ b/README.md @@ -1,39 +1,51 @@ -peda -==== +# peda PEDA - Python Exploit Development Assistance for GDB ## Key Features: -* Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. -* Add commands to support debugging and exploit development (for a full list of commands use `peda help`): - * `aslr` -- Show/set ASLR setting of GDB - * `checksec` -- Check for various security options of binary - * `dumpargs` -- Display arguments passed to a function when stopped at a call instruction - * `dumprop` -- Dump all ROP gadgets in specific memory range - * `elfheader` -- Get headers information from debugged ELF file - * `elfsymbol` -- Get non-debugging symbol information from an ELF file - * `lookup` -- Search for all addresses/references to addresses which belong to a memory range - * `patch` -- Patch memory start at an address with string/hexstring/int - * `pattern` -- Generate, search, or write a cyclic pattern to memory - * `procinfo` -- Display various info from /proc/pid/ - * `pshow` -- Show various PEDA options and other settings - * `pset` -- Set various PEDA options and other settings - * `readelf` -- Get headers information from an ELF file - * `ropgadget` -- Get common ROP gadgets of binary or library - * `ropsearch` -- Search for ROP gadgets in memory - * `searchmem|find` -- Search for a pattern in memory; support regex search - * `shellcode` -- Generate or download common shellcodes. - * `skeleton` -- Generate python exploit code template - * `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process - * `xormem` -- XOR a memory region with a key + +- Enhance the display of gdb: colorize and display disassembly codes, registers, memory information during debugging. +- Add commands to support debugging and exploit development (for a full list of commands use `peda help`): + - `aslr` -- Show/set ASLR setting of GDB + - `checksec` -- Check for various security options of binary + - `dumpargs` -- Display arguments passed to a function when stopped at a call instruction + - `dumprop` -- Dump all ROP gadgets in specific memory range + - `elfheader` -- Get headers information from debugged ELF file + - `elfsymbol` -- Get non-debugging symbol information from an ELF file + - `lookup` -- Search for all addresses/references to addresses which belong to a memory range + - `patch` -- Patch memory start at an address with string/hexstring/int + - `pattern` -- Generate, search, or write a cyclic pattern to memory + - `procinfo` -- Display various info from /proc/pid/ + - `pshow` -- Show various PEDA options and other settings + - `pset` -- Set various PEDA options and other settings + - `readelf` -- Get headers information from an ELF file + - `ropgadget` -- Get common ROP gadgets of binary or library + - `ropsearch` -- Search for ROP gadgets in memory + - `searchmem|find` -- Search for a pattern in memory; support regex search + - `shellcode` -- Generate or download common shellcodes. + - `skeleton` -- Generate python exploit code template + - `vmmap` -- Get virtual mapping address ranges of section(s) in debugged process + - `xormem` -- XOR a memory region with a key ## Installation - git clone https://github.com/longld/peda.git ~/peda +- Python Deps + +```sh +sudo pacman -S python-six # arch +sudo apt install python-siz # debian +``` + +- clone repository + +```sh + git clone https://github.com/punixcorn/peda.git ~/peda echo "source ~/peda/peda.py" >> ~/.gdbinit echo "DONE! debug your program with gdb and enjoy" +``` ## Screenshot + ![start](http://i.imgur.com/P1BF5mp.png) ![pattern arg](http://i.imgur.com/W97OWRC.png) diff --git a/lib/.gdb_history b/lib/.gdb_history new file mode 100644 index 0000000..bca70f3 --- /dev/null +++ b/lib/.gdb_history @@ -0,0 +1 @@ +q diff --git a/lib/six.py b/lib/six.py deleted file mode 100644 index ffa3fe1..0000000 --- a/lib/six.py +++ /dev/null @@ -1,838 +0,0 @@ -"""Utilities for writing code that runs on Python 2 and 3""" - -# Copyright (c) 2010-2015 Benjamin Peterson -# -# Permission is hereby granted, free of charge, to any person obtaining a copy -# of this software and associated documentation files (the "Software"), to deal -# in the Software without restriction, including without limitation the rights -# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell -# copies of the Software, and to permit persons to whom the Software is -# furnished to do so, subject to the following conditions: -# -# The above copyright notice and this permission notice shall be included in all -# copies or substantial portions of the Software. -# -# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR -# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, -# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE -# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER -# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, -# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE -# SOFTWARE. - -from __future__ import absolute_import - -import functools -import itertools -import operator -import sys -import types - -__author__ = "Benjamin Peterson " -__version__ = "1.9.0" - - -# Useful for very coarse version differentiation. -PY2 = sys.version_info[0] == 2 -PY3 = sys.version_info[0] == 3 - -if PY3: - string_types = str, - integer_types = int, - class_types = type, - text_type = str - binary_type = bytes - - MAXSIZE = sys.maxsize -else: - string_types = basestring, - integer_types = (int, long) - class_types = (type, types.ClassType) - text_type = unicode - binary_type = str - - if sys.platform.startswith("java"): - # Jython always uses 32 bits. - MAXSIZE = int((1 << 31) - 1) - else: - # It's possible to have sizeof(long) != sizeof(Py_ssize_t). - class X(object): - def __len__(self): - return 1 << 31 - try: - len(X()) - except OverflowError: - # 32-bit - MAXSIZE = int((1 << 31) - 1) - else: - # 64-bit - MAXSIZE = int((1 << 63) - 1) - del X - - -def _add_doc(func, doc): - """Add documentation to a function.""" - func.__doc__ = doc - - -def _import_module(name): - """Import module, returning the module after the last dot.""" - __import__(name) - return sys.modules[name] - - -class _LazyDescr(object): - - def __init__(self, name): - self.name = name - - def __get__(self, obj, tp): - result = self._resolve() - setattr(obj, self.name, result) # Invokes __set__. - try: - # This is a bit ugly, but it avoids running this again by - # removing this descriptor. - delattr(obj.__class__, self.name) - except AttributeError: - pass - return result - - -class MovedModule(_LazyDescr): - - def __init__(self, name, old, new=None): - super(MovedModule, self).__init__(name) - if PY3: - if new is None: - new = name - self.mod = new - else: - self.mod = old - - def _resolve(self): - return _import_module(self.mod) - - def __getattr__(self, attr): - _module = self._resolve() - value = getattr(_module, attr) - setattr(self, attr, value) - return value - - -class _LazyModule(types.ModuleType): - - def __init__(self, name): - super(_LazyModule, self).__init__(name) - self.__doc__ = self.__class__.__doc__ - - def __dir__(self): - attrs = ["__doc__", "__name__"] - attrs += [attr.name for attr in self._moved_attributes] - return attrs - - # Subclasses should override this - _moved_attributes = [] - - -class MovedAttribute(_LazyDescr): - - def __init__(self, name, old_mod, new_mod, old_attr=None, new_attr=None): - super(MovedAttribute, self).__init__(name) - if PY3: - if new_mod is None: - new_mod = name - self.mod = new_mod - if new_attr is None: - if old_attr is None: - new_attr = name - else: - new_attr = old_attr - self.attr = new_attr - else: - self.mod = old_mod - if old_attr is None: - old_attr = name - self.attr = old_attr - - def _resolve(self): - module = _import_module(self.mod) - return getattr(module, self.attr) - - -class _SixMetaPathImporter(object): - """ - A meta path importer to import six.moves and its submodules. - - This class implements a PEP302 finder and loader. It should be compatible - with Python 2.5 and all existing versions of Python3 - """ - def __init__(self, six_module_name): - self.name = six_module_name - self.known_modules = {} - - def _add_module(self, mod, *fullnames): - for fullname in fullnames: - self.known_modules[self.name + "." + fullname] = mod - - def _get_module(self, fullname): - return self.known_modules[self.name + "." + fullname] - - def find_module(self, fullname, path=None): - if fullname in self.known_modules: - return self - return None - - def __get_module(self, fullname): - try: - return self.known_modules[fullname] - except KeyError: - raise ImportError("This loader does not know module " + fullname) - - def load_module(self, fullname): - try: - # in case of a reload - return sys.modules[fullname] - except KeyError: - pass - mod = self.__get_module(fullname) - if isinstance(mod, MovedModule): - mod = mod._resolve() - else: - mod.__loader__ = self - sys.modules[fullname] = mod - return mod - - def is_package(self, fullname): - """ - Return true, if the named module is a package. - - We need this method to get correct spec objects with - Python 3.4 (see PEP451) - """ - return hasattr(self.__get_module(fullname), "__path__") - - def get_code(self, fullname): - """Return None - - Required, if is_package is implemented""" - self.__get_module(fullname) # eventually raises ImportError - return None - get_source = get_code # same as get_code - -_importer = _SixMetaPathImporter(__name__) - - -class _MovedItems(_LazyModule): - """Lazy loading of moved objects""" - __path__ = [] # mark as package - - -_moved_attributes = [ - MovedAttribute("cStringIO", "cStringIO", "io", "StringIO"), - MovedAttribute("filter", "itertools", "builtins", "ifilter", "filter"), - MovedAttribute("filterfalse", "itertools", "itertools", "ifilterfalse", "filterfalse"), - MovedAttribute("input", "__builtin__", "builtins", "raw_input", "input"), - MovedAttribute("intern", "__builtin__", "sys"), - MovedAttribute("map", "itertools", "builtins", "imap", "map"), - MovedAttribute("range", "__builtin__", "builtins", "xrange", "range"), - MovedAttribute("reload_module", "__builtin__", "imp", "reload"), - MovedAttribute("reduce", "__builtin__", "functools"), - MovedAttribute("shlex_quote", "pipes", "shlex", "quote"), - MovedAttribute("StringIO", "StringIO", "io"), - MovedAttribute("UserDict", "UserDict", "collections"), - MovedAttribute("UserList", "UserList", "collections"), - MovedAttribute("UserString", "UserString", "collections"), - MovedAttribute("xrange", "__builtin__", "builtins", "xrange", "range"), - MovedAttribute("zip", "itertools", "builtins", "izip", "zip"), - MovedAttribute("zip_longest", "itertools", "itertools", "izip_longest", "zip_longest"), - - MovedModule("builtins", "__builtin__"), - MovedModule("configparser", "ConfigParser"), - MovedModule("copyreg", "copy_reg"), - MovedModule("dbm_gnu", "gdbm", "dbm.gnu"), - MovedModule("_dummy_thread", "dummy_thread", "_dummy_thread"), - MovedModule("http_cookiejar", "cookielib", "http.cookiejar"), - MovedModule("http_cookies", "Cookie", "http.cookies"), - MovedModule("html_entities", "htmlentitydefs", "html.entities"), - MovedModule("html_parser", "HTMLParser", "html.parser"), - MovedModule("http_client", "httplib", "http.client"), - MovedModule("email_mime_multipart", "email.MIMEMultipart", "email.mime.multipart"), - MovedModule("email_mime_nonmultipart", "email.MIMENonMultipart", "email.mime.nonmultipart"), - MovedModule("email_mime_text", "email.MIMEText", "email.mime.text"), - MovedModule("email_mime_base", "email.MIMEBase", "email.mime.base"), - MovedModule("BaseHTTPServer", "BaseHTTPServer", "http.server"), - MovedModule("CGIHTTPServer", "CGIHTTPServer", "http.server"), - MovedModule("SimpleHTTPServer", "SimpleHTTPServer", "http.server"), - MovedModule("cPickle", "cPickle", "pickle"), - MovedModule("queue", "Queue"), - MovedModule("reprlib", "repr"), - MovedModule("socketserver", "SocketServer"), - MovedModule("_thread", "thread", "_thread"), - MovedModule("tkinter", "Tkinter"), - MovedModule("tkinter_dialog", "Dialog", "tkinter.dialog"), - MovedModule("tkinter_filedialog", "FileDialog", "tkinter.filedialog"), - MovedModule("tkinter_scrolledtext", "ScrolledText", "tkinter.scrolledtext"), - MovedModule("tkinter_simpledialog", "SimpleDialog", "tkinter.simpledialog"), - MovedModule("tkinter_tix", "Tix", "tkinter.tix"), - MovedModule("tkinter_ttk", "ttk", "tkinter.ttk"), - MovedModule("tkinter_constants", "Tkconstants", "tkinter.constants"), - MovedModule("tkinter_dnd", "Tkdnd", "tkinter.dnd"), - MovedModule("tkinter_colorchooser", "tkColorChooser", - "tkinter.colorchooser"), - MovedModule("tkinter_commondialog", "tkCommonDialog", - "tkinter.commondialog"), - MovedModule("tkinter_tkfiledialog", "tkFileDialog", "tkinter.filedialog"), - MovedModule("tkinter_font", "tkFont", "tkinter.font"), - MovedModule("tkinter_messagebox", "tkMessageBox", "tkinter.messagebox"), - MovedModule("tkinter_tksimpledialog", "tkSimpleDialog", - "tkinter.simpledialog"), - MovedModule("urllib_parse", __name__ + ".moves.urllib_parse", "urllib.parse"), - MovedModule("urllib_error", __name__ + ".moves.urllib_error", "urllib.error"), - MovedModule("urllib", __name__ + ".moves.urllib", __name__ + ".moves.urllib"), - MovedModule("urllib_robotparser", "robotparser", "urllib.robotparser"), - MovedModule("xmlrpc_client", "xmlrpclib", "xmlrpc.client"), - MovedModule("xmlrpc_server", "SimpleXMLRPCServer", "xmlrpc.server"), - MovedModule("winreg", "_winreg"), -] -for attr in _moved_attributes: - setattr(_MovedItems, attr.name, attr) - if isinstance(attr, MovedModule): - _importer._add_module(attr, "moves." + attr.name) -del attr - -_MovedItems._moved_attributes = _moved_attributes - -moves = _MovedItems(__name__ + ".moves") -_importer._add_module(moves, "moves") - - -class Module_six_moves_urllib_parse(_LazyModule): - """Lazy loading of moved objects in six.moves.urllib_parse""" - - -_urllib_parse_moved_attributes = [ - MovedAttribute("ParseResult", "urlparse", "urllib.parse"), - MovedAttribute("SplitResult", "urlparse", "urllib.parse"), - MovedAttribute("parse_qs", "urlparse", "urllib.parse"), - MovedAttribute("parse_qsl", "urlparse", "urllib.parse"), - MovedAttribute("urldefrag", "urlparse", "urllib.parse"), - MovedAttribute("urljoin", "urlparse", "urllib.parse"), - MovedAttribute("urlparse", "urlparse", "urllib.parse"), - MovedAttribute("urlsplit", "urlparse", "urllib.parse"), - MovedAttribute("urlunparse", "urlparse", "urllib.parse"), - MovedAttribute("urlunsplit", "urlparse", "urllib.parse"), - MovedAttribute("quote", "urllib", "urllib.parse"), - MovedAttribute("quote_plus", "urllib", "urllib.parse"), - MovedAttribute("unquote", "urllib", "urllib.parse"), - MovedAttribute("unquote_plus", "urllib", "urllib.parse"), - MovedAttribute("urlencode", "urllib", "urllib.parse"), - MovedAttribute("splitquery", "urllib", "urllib.parse"), - MovedAttribute("splittag", "urllib", "urllib.parse"), - MovedAttribute("splituser", "urllib", "urllib.parse"), - MovedAttribute("uses_fragment", "urlparse", "urllib.parse"), - MovedAttribute("uses_netloc", "urlparse", "urllib.parse"), - MovedAttribute("uses_params", "urlparse", "urllib.parse"), - MovedAttribute("uses_query", "urlparse", "urllib.parse"), - MovedAttribute("uses_relative", "urlparse", "urllib.parse"), -] -for attr in _urllib_parse_moved_attributes: - setattr(Module_six_moves_urllib_parse, attr.name, attr) -del attr - -Module_six_moves_urllib_parse._moved_attributes = _urllib_parse_moved_attributes - -_importer._add_module(Module_six_moves_urllib_parse(__name__ + ".moves.urllib_parse"), - "moves.urllib_parse", "moves.urllib.parse") - - -class Module_six_moves_urllib_error(_LazyModule): - """Lazy loading of moved objects in six.moves.urllib_error""" - - -_urllib_error_moved_attributes = [ - MovedAttribute("URLError", "urllib2", "urllib.error"), - MovedAttribute("HTTPError", "urllib2", "urllib.error"), - MovedAttribute("ContentTooShortError", "urllib", "urllib.error"), -] -for attr in _urllib_error_moved_attributes: - setattr(Module_six_moves_urllib_error, attr.name, attr) -del attr - -Module_six_moves_urllib_error._moved_attributes = _urllib_error_moved_attributes - -_importer._add_module(Module_six_moves_urllib_error(__name__ + ".moves.urllib.error"), - "moves.urllib_error", "moves.urllib.error") - - -class Module_six_moves_urllib_request(_LazyModule): - """Lazy loading of moved objects in six.moves.urllib_request""" - - -_urllib_request_moved_attributes = [ - MovedAttribute("urlopen", "urllib2", "urllib.request"), - MovedAttribute("install_opener", "urllib2", "urllib.request"), - MovedAttribute("build_opener", "urllib2", "urllib.request"), - MovedAttribute("pathname2url", "urllib", "urllib.request"), - MovedAttribute("url2pathname", "urllib", "urllib.request"), - MovedAttribute("getproxies", "urllib", "urllib.request"), - MovedAttribute("Request", "urllib2", "urllib.request"), - MovedAttribute("OpenerDirector", "urllib2", "urllib.request"), - MovedAttribute("HTTPDefaultErrorHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPRedirectHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPCookieProcessor", "urllib2", "urllib.request"), - MovedAttribute("ProxyHandler", "urllib2", "urllib.request"), - MovedAttribute("BaseHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPPasswordMgr", "urllib2", "urllib.request"), - MovedAttribute("HTTPPasswordMgrWithDefaultRealm", "urllib2", "urllib.request"), - MovedAttribute("AbstractBasicAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPBasicAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("ProxyBasicAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("AbstractDigestAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPDigestAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("ProxyDigestAuthHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPSHandler", "urllib2", "urllib.request"), - MovedAttribute("FileHandler", "urllib2", "urllib.request"), - MovedAttribute("FTPHandler", "urllib2", "urllib.request"), - MovedAttribute("CacheFTPHandler", "urllib2", "urllib.request"), - MovedAttribute("UnknownHandler", "urllib2", "urllib.request"), - MovedAttribute("HTTPErrorProcessor", "urllib2", "urllib.request"), - MovedAttribute("urlretrieve", "urllib", "urllib.request"), - MovedAttribute("urlcleanup", "urllib", "urllib.request"), - MovedAttribute("URLopener", "urllib", "urllib.request"), - MovedAttribute("FancyURLopener", "urllib", "urllib.request"), - MovedAttribute("proxy_bypass", "urllib", "urllib.request"), -] -for attr in _urllib_request_moved_attributes: - setattr(Module_six_moves_urllib_request, attr.name, attr) -del attr - -Module_six_moves_urllib_request._moved_attributes = _urllib_request_moved_attributes - -_importer._add_module(Module_six_moves_urllib_request(__name__ + ".moves.urllib.request"), - "moves.urllib_request", "moves.urllib.request") - - -class Module_six_moves_urllib_response(_LazyModule): - """Lazy loading of moved objects in six.moves.urllib_response""" - - -_urllib_response_moved_attributes = [ - MovedAttribute("addbase", "urllib", "urllib.response"), - MovedAttribute("addclosehook", "urllib", "urllib.response"), - MovedAttribute("addinfo", "urllib", "urllib.response"), - MovedAttribute("addinfourl", "urllib", "urllib.response"), -] -for attr in _urllib_response_moved_attributes: - setattr(Module_six_moves_urllib_response, attr.name, attr) -del attr - -Module_six_moves_urllib_response._moved_attributes = _urllib_response_moved_attributes - -_importer._add_module(Module_six_moves_urllib_response(__name__ + ".moves.urllib.response"), - "moves.urllib_response", "moves.urllib.response") - - -class Module_six_moves_urllib_robotparser(_LazyModule): - """Lazy loading of moved objects in six.moves.urllib_robotparser""" - - -_urllib_robotparser_moved_attributes = [ - MovedAttribute("RobotFileParser", "robotparser", "urllib.robotparser"), -] -for attr in _urllib_robotparser_moved_attributes: - setattr(Module_six_moves_urllib_robotparser, attr.name, attr) -del attr - -Module_six_moves_urllib_robotparser._moved_attributes = _urllib_robotparser_moved_attributes - -_importer._add_module(Module_six_moves_urllib_robotparser(__name__ + ".moves.urllib.robotparser"), - "moves.urllib_robotparser", "moves.urllib.robotparser") - - -class Module_six_moves_urllib(types.ModuleType): - """Create a six.moves.urllib namespace that resembles the Python 3 namespace""" - __path__ = [] # mark as package - parse = _importer._get_module("moves.urllib_parse") - error = _importer._get_module("moves.urllib_error") - request = _importer._get_module("moves.urllib_request") - response = _importer._get_module("moves.urllib_response") - robotparser = _importer._get_module("moves.urllib_robotparser") - - def __dir__(self): - return ['parse', 'error', 'request', 'response', 'robotparser'] - -_importer._add_module(Module_six_moves_urllib(__name__ + ".moves.urllib"), - "moves.urllib") - - -def add_move(move): - """Add an item to six.moves.""" - setattr(_MovedItems, move.name, move) - - -def remove_move(name): - """Remove item from six.moves.""" - try: - delattr(_MovedItems, name) - except AttributeError: - try: - del moves.__dict__[name] - except KeyError: - raise AttributeError("no such move, %r" % (name,)) - - -if PY3: - _meth_func = "__func__" - _meth_self = "__self__" - - _func_closure = "__closure__" - _func_code = "__code__" - _func_defaults = "__defaults__" - _func_globals = "__globals__" -else: - _meth_func = "im_func" - _meth_self = "im_self" - - _func_closure = "func_closure" - _func_code = "func_code" - _func_defaults = "func_defaults" - _func_globals = "func_globals" - - -try: - advance_iterator = next -except NameError: - def advance_iterator(it): - return it.next() -next = advance_iterator - - -try: - callable = callable -except NameError: - def callable(obj): - return any("__call__" in klass.__dict__ for klass in type(obj).__mro__) - - -if PY3: - def get_unbound_function(unbound): - return unbound - - create_bound_method = types.MethodType - - Iterator = object -else: - def get_unbound_function(unbound): - return unbound.im_func - - def create_bound_method(func, obj): - return types.MethodType(func, obj, obj.__class__) - - class Iterator(object): - - def next(self): - return type(self).__next__(self) - - callable = callable -_add_doc(get_unbound_function, - """Get the function out of a possibly unbound function""") - - -get_method_function = operator.attrgetter(_meth_func) -get_method_self = operator.attrgetter(_meth_self) -get_function_closure = operator.attrgetter(_func_closure) -get_function_code = operator.attrgetter(_func_code) -get_function_defaults = operator.attrgetter(_func_defaults) -get_function_globals = operator.attrgetter(_func_globals) - - -if PY3: - def iterkeys(d, **kw): - return iter(d.keys(**kw)) - - def itervalues(d, **kw): - return iter(d.values(**kw)) - - def iteritems(d, **kw): - return iter(d.items(**kw)) - - def iterlists(d, **kw): - return iter(d.lists(**kw)) - - viewkeys = operator.methodcaller("keys") - - viewvalues = operator.methodcaller("values") - - viewitems = operator.methodcaller("items") -else: - def iterkeys(d, **kw): - return iter(d.iterkeys(**kw)) - - def itervalues(d, **kw): - return iter(d.itervalues(**kw)) - - def iteritems(d, **kw): - return iter(d.iteritems(**kw)) - - def iterlists(d, **kw): - return iter(d.iterlists(**kw)) - - viewkeys = operator.methodcaller("viewkeys") - - viewvalues = operator.methodcaller("viewvalues") - - viewitems = operator.methodcaller("viewitems") - -_add_doc(iterkeys, "Return an iterator over the keys of a dictionary.") -_add_doc(itervalues, "Return an iterator over the values of a dictionary.") -_add_doc(iteritems, - "Return an iterator over the (key, value) pairs of a dictionary.") -_add_doc(iterlists, - "Return an iterator over the (key, [values]) pairs of a dictionary.") - - -if PY3: - def b(s): - return s.encode("latin-1") - def u(s): - return s - unichr = chr - if sys.version_info[1] <= 1: - def int2byte(i): - return bytes((i,)) - else: - # This is about 2x faster than the implementation above on 3.2+ - int2byte = operator.methodcaller("to_bytes", 1, "big") - byte2int = operator.itemgetter(0) - indexbytes = operator.getitem - iterbytes = iter - import io - StringIO = io.StringIO - BytesIO = io.BytesIO - _assertCountEqual = "assertCountEqual" - _assertRaisesRegex = "assertRaisesRegex" - _assertRegex = "assertRegex" -else: - def b(s): - return s - # Workaround for standalone backslash - def u(s): - return unicode(s.replace(r'\\', r'\\\\'), "unicode_escape") - unichr = unichr - int2byte = chr - def byte2int(bs): - return ord(bs[0]) - def indexbytes(buf, i): - return ord(buf[i]) - iterbytes = functools.partial(itertools.imap, ord) - import StringIO - StringIO = BytesIO = StringIO.StringIO - _assertCountEqual = "assertItemsEqual" - _assertRaisesRegex = "assertRaisesRegexp" - _assertRegex = "assertRegexpMatches" -_add_doc(b, """Byte literal""") -_add_doc(u, """Text literal""") - - -def assertCountEqual(self, *args, **kwargs): - return getattr(self, _assertCountEqual)(*args, **kwargs) - - -def assertRaisesRegex(self, *args, **kwargs): - return getattr(self, _assertRaisesRegex)(*args, **kwargs) - - -def assertRegex(self, *args, **kwargs): - return getattr(self, _assertRegex)(*args, **kwargs) - - -if PY3: - exec_ = getattr(moves.builtins, "exec") - - - def reraise(tp, value, tb=None): - if value is None: - value = tp() - if value.__traceback__ is not tb: - raise value.with_traceback(tb) - raise value - -else: - def exec_(_code_, _globs_=None, _locs_=None): - """Execute code in a namespace.""" - if _globs_ is None: - frame = sys._getframe(1) - _globs_ = frame.f_globals - if _locs_ is None: - _locs_ = frame.f_locals - del frame - elif _locs_ is None: - _locs_ = _globs_ - exec("""exec _code_ in _globs_, _locs_""") - - - exec_("""def reraise(tp, value, tb=None): - raise tp, value, tb -""") - - -if sys.version_info[:2] == (3, 2): - exec_("""def raise_from(value, from_value): - if from_value is None: - raise value - raise value from from_value -""") -elif sys.version_info[:2] > (3, 2): - exec_("""def raise_from(value, from_value): - raise value from from_value -""") -else: - def raise_from(value, from_value): - raise value - - -print_ = getattr(moves.builtins, "print", None) -if print_ is None: - def print_(*args, **kwargs): - """The new-style print function for Python 2.4 and 2.5.""" - fp = kwargs.pop("file", sys.stdout) - if fp is None: - return - def write(data): - if not isinstance(data, basestring): - data = str(data) - # If the file has an encoding, encode unicode with it. - if (isinstance(fp, file) and - isinstance(data, unicode) and - fp.encoding is not None): - errors = getattr(fp, "errors", None) - if errors is None: - errors = "strict" - data = data.encode(fp.encoding, errors) - fp.write(data) - want_unicode = False - sep = kwargs.pop("sep", None) - if sep is not None: - if isinstance(sep, unicode): - want_unicode = True - elif not isinstance(sep, str): - raise TypeError("sep must be None or a string") - end = kwargs.pop("end", None) - if end is not None: - if isinstance(end, unicode): - want_unicode = True - elif not isinstance(end, str): - raise TypeError("end must be None or a string") - if kwargs: - raise TypeError("invalid keyword arguments to print()") - if not want_unicode: - for arg in args: - if isinstance(arg, unicode): - want_unicode = True - break - if want_unicode: - newline = unicode("\n") - space = unicode(" ") - else: - newline = "\n" - space = " " - if sep is None: - sep = space - if end is None: - end = newline - for i, arg in enumerate(args): - if i: - write(sep) - write(arg) - write(end) -if sys.version_info[:2] < (3, 3): - _print = print_ - def print_(*args, **kwargs): - fp = kwargs.get("file", sys.stdout) - flush = kwargs.pop("flush", False) - _print(*args, **kwargs) - if flush and fp is not None: - fp.flush() - -_add_doc(reraise, """Reraise an exception.""") - -if sys.version_info[0:2] < (3, 4): - def wraps(wrapped, assigned=functools.WRAPPER_ASSIGNMENTS, - updated=functools.WRAPPER_UPDATES): - def wrapper(f): - f = functools.wraps(wrapped, assigned, updated)(f) - f.__wrapped__ = wrapped - return f - return wrapper -else: - wraps = functools.wraps - -def with_metaclass(meta, *bases): - """Create a base class with a metaclass.""" - # This requires a bit of explanation: the basic idea is to make a dummy - # metaclass for one level of class instantiation that replaces itself with - # the actual metaclass. - class metaclass(meta): - def __new__(cls, name, this_bases, d): - return meta(name, bases, d) - return type.__new__(metaclass, 'temporary_class', (), {}) - - -def add_metaclass(metaclass): - """Class decorator for creating a class with a metaclass.""" - def wrapper(cls): - orig_vars = cls.__dict__.copy() - slots = orig_vars.get('__slots__') - if slots is not None: - if isinstance(slots, str): - slots = [slots] - for slots_var in slots: - orig_vars.pop(slots_var) - orig_vars.pop('__dict__', None) - orig_vars.pop('__weakref__', None) - return metaclass(cls.__name__, cls.__bases__, orig_vars) - return wrapper - - -def python_2_unicode_compatible(klass): - """ - A decorator that defines __unicode__ and __str__ methods under Python 2. - Under Python 3 it does nothing. - - To support Python 2 and 3 with a single code base, define a __str__ method - returning text and apply this decorator to the class. - """ - if PY2: - if '__str__' not in klass.__dict__: - raise ValueError("@python_2_unicode_compatible cannot be applied " - "to %s because it doesn't define __str__()." % - klass.__name__) - klass.__unicode__ = klass.__str__ - klass.__str__ = lambda self: self.__unicode__().encode('utf-8') - return klass - - -# Complete the moves implementation. -# This code is at the end of this module to speed up module loading. -# Turn this module into a package. -__path__ = [] # required for PEP 302 and PEP 451 -__package__ = __name__ # see PEP 366 @ReservedAssignment -if globals().get("__spec__") is not None: - __spec__.submodule_search_locations = [] # PEP 451 @UndefinedVariable -# Remove other six meta path importers, since they cause problems. This can -# happen if six is removed from sys.modules and then reloaded. (Setuptools does -# this for some reason.) -if sys.meta_path: - for i, importer in enumerate(sys.meta_path): - # Here's some real nastiness: Another "instance" of the six module might - # be floating around. Therefore, we can't use isinstance() to check for - # the six meta path importer, since the other six instance will have - # inserted an importer with different class. - if (type(importer).__name__ == "_SixMetaPathImporter" and - importer.name == __name__): - del sys.meta_path[i] - break - del i, importer -# Finally, add the importer to the meta path import hook. -sys.meta_path.append(_importer) diff --git a/peda.py b/peda.py index 14a7f5e..231f242 100644 --- a/peda.py +++ b/peda.py @@ -18,7 +18,6 @@ import signal import traceback import codecs - # point to absolute path of peda.py PEDAFILE = os.path.abspath(os.path.expanduser(__file__)) if os.path.islink(PEDAFILE): @@ -26,7 +25,7 @@ sys.path.insert(0, os.path.dirname(PEDAFILE) + "/lib/") # Use six library to provide Python 2/3 compatibility -import six +#import six from six.moves import range from six.moves import input try: @@ -35,7 +34,6 @@ import pickle - from skeleton import * from shellcode import * from utils import * @@ -148,10 +146,10 @@ def parse_and_eval(self, exp): if "$"+r not in exp and "e"+r not in exp and "r"+r not in exp: exp = exp.replace(r, "$%s" % r) - p = re.compile("(.*)\[(.*)\]") # DWORD PTR [esi+eax*1] + p = re.compile(r"(.*)\[(.*)\]") # DWORD PTR [esi+eax*1] matches = p.search(exp) if not matches: - p = re.compile("(.*).s:(0x.*)") # DWORD PTR ds:0xdeadbeef + p = re.compile(r"(.*).s:(0x.*)") # DWORD PTR ds:0xdeadbeef matches = p.search(exp) if matches: @@ -370,12 +368,12 @@ def getfile(self): result = None out = self.execute_redirect('info files') if out and '"' in out: - p = re.compile(".*exec file:\s*`(.*)'") + p = re.compile(r".*exec file:\s*`(.*)'") m = p.search(out) if m: result = m.group(1) else: # stripped file, get symbol file - p = re.compile("Symbols from \"([^\"]*)") + p = re.compile(r"Symbols from \"([^\"]*)") m = p.search(out) if m: result = m.group(1) @@ -547,11 +545,11 @@ def get_breakpoint(self, num): lines = out.splitlines()[1:] # breakpoint regex - p = re.compile("^(\d*)\s*(.*breakpoint)\s*(keep|del)\s*(y|n)\s*(0x[^ ]*)\s*(.*)") + p = re.compile(r"^(\d*)\s*(.*breakpoint)\s*(keep|del)\s*(y|n)\s*(0x[^ ]*)\s*(.*)") m = p.match(lines[0]) if not m: # catchpoint/watchpoint regex - p = re.compile("^(\d*)\s*(.*point)\s*(keep|del)\s*(y|n)\s*(.*)") + p = re.compile(r"^(\d*)\s*(.*point)\s*(keep|del)\s*(y|n)\s*(.*)") m = p.match(lines[0]) if not m: return None @@ -564,7 +562,7 @@ def get_breakpoint(self, num): disp = True if disp == "keep" else False enb = True if enb == "y" else False addr = to_int(addr) - m = re.match("in.*at(.*:\d*)", what) + m = re.match(r"in.*at(.*:\d*)", what) if m: what = m.group(1) else: @@ -593,7 +591,7 @@ def get_breakpoints(self): bplist = [] for line in out.splitlines(): - m = re.match("^(\d*).*", line) + m = re.match(r"^(\d*).*", line) if m and to_int(m.group(1)): bplist += [to_int(m.group(1))] @@ -625,7 +623,7 @@ def save_breakpoints(self, filename): try: fd = open(filename, "w") for (num, type, disp, enb, addr, what, commands) in bplist: - m = re.match("(.*)point", type) + m = re.match(r"(.*)point", type) if m: cmd = m.group(1).split()[-1] else: @@ -786,7 +784,7 @@ def prev_inst(self, address, count=1): if len(lines) > count and "(bad)" not in " ".join(lines): for line in lines[-count-1:-1]: (addr, code) = line.split(":", 1) - addr = re.search("(0x[^ ]*)", addr).group(1) + addr = re.search(r"(0x[^ ]*)", addr).group(1) result += [(to_int(addr), code)] return result return None @@ -807,7 +805,7 @@ def current_inst(self, address): return None (addr, code) = out.split(":", 1) - addr = re.search("(0x[^ ]*)", addr).group(1) + addr = re.search(r"(0x[^ ]*)", addr).group(1) addr = to_int(addr) code = code.strip() @@ -833,7 +831,7 @@ def next_inst(self, address, count=1): lines = code.strip().splitlines() for i in range(1, count+1): (addr, code) = lines[i].split(":", 1) - addr = re.search("(0x[^ ]*)", addr).group(1) + addr = re.search(r"(0x[^ ]*)", addr).group(1) result += [(to_int(addr), code)] return result @@ -913,9 +911,9 @@ def xrefs(self, search="", filename=None): out = self.execute_redirect("x/i 0x%x" % addr) if out: line = out - p = re.compile("\s*(0x[^ ]*).*?:\s*([^ ]*)\s*(.*)") + p = re.compile(r"\s*(0x[^ ]*).*?:\s*([^ ]*)\s*(.*)") else: - p = re.compile("(.*?)\s*<.*?>\s*([^ ]*)\s*(.*)") + p = re.compile(r"(.*?)\s*<.*?>\s*([^ ]*)\s*(.*)") m = p.search(line) if m: @@ -934,7 +932,7 @@ def _get_function_args_32(self, code, argc=None): """ if not argc: argc = 0 - p = re.compile(".*mov.*\[esp(.*)\],") + p = re.compile(r".*mov.*\[esp(.*)\],") matches = p.findall(code) if matches: l = len(matches) @@ -966,11 +964,11 @@ def _get_function_args_64(self, code, argc=None): # just retrieve max 6 args arg_order = ["rdi", "rsi", "rdx", "rcx", "r8", "r9"] - p = re.compile(":\s*([^ ]*)\s*(.*),") + p = re.compile(r":\s*([^ ]*)\s*(.*),") matches = p.findall(code) regs = [r for (_, r) in matches] p = re.compile(("di|si|dx|cx|r8|r9")) - m = p.findall(" ".join(regs)) + m = p.findall(r" ".join(regs)) m = list(set(m)) # uniqify argc = 0 if "si" in m and "di" not in m: # dirty fix @@ -1106,14 +1104,14 @@ def stepuntil(self, inst, mapname=None, depth=None): current_instruction = "End of execution" break - p = re.compile(".*?(0x[^ :]*)") + p = re.compile(r".*?(0x[^ :]*)") addr = p.search(current_instruction).group(1) addr = to_int(addr) if addr is None: break - #p = re.compile(".*?:\s*([^ ]*)") - p = re.compile(".*?:\s*(.*)") + #p = re.compile(r".*?:\s*([^ ]*)") + p = re.compile(r".*?:\s*(.*)") code = p.match(current_instruction).group(1) found = 0 for i in inst.replace(",", " ").split(): @@ -1220,10 +1218,10 @@ def eval_target(self, inst): inst = inst.strip() opcode = inst.split(":\t")[-1].split()[0] # this regex includes x86_64 RIP relateive address reference - p = re.compile(".*?:\s*[^ ]*\s*(.* PTR ).*(0x[^ ]*)") + p = re.compile(r".*?:\s*[^ ]*\s*(.* PTR ).*(0x[^ ]*)") m = p.search(inst) if not m: - p = re.compile(".*?:\s.*\s(0x[^ ]*|\w+)") + p = re.compile(r".*?:\s.*\s(0x[^ ]*|\w+)") m = p.search(inst) if m: target = m.group(1) @@ -1232,7 +1230,7 @@ def eval_target(self, inst): target = None else: if "]" in m.group(2): # e.g DWORD PTR [ebx+0xc] - p = re.compile(".*?:\s*[^ ]*\s*(.* PTR ).*\[(.*)\]") + p = re.compile(r".*?:\s*[^ ]*\s*(.* PTR ).*\[(.*)\]") m = p.search(inst) target = self.parse_and_eval("%s[%s]" % (m.group(1), m.group(2).strip())) @@ -1427,7 +1425,7 @@ def _get_offline_maps(): def _get_allmaps_osx(pid, remote=False): maps = [] #_DATA 00007fff77975000-00007fff77976000 [ 4K] rw-/rw- SM=COW /usr/lib/system/libremovefile.dylib - pattern = re.compile("([^\n]*)\s* ([0-9a-f][^-\s]*)-([^\s]*) \[.*\]\s([^/]*).* (.*)") + pattern = re.compile(r"([^\n]*)\s* ([0-9a-f][^-\s]*)-([^\s]*) \[.*\]\s([^/]*).* (.*)") if remote: # remote target, not yet supported return maps @@ -1452,7 +1450,7 @@ def _get_allmaps_freebsd(pid, remote=False): maps = [] mpath = "/proc/%s/map" % pid # 0x8048000 0x8049000 1 0 0xc36afdd0 r-x 1 0 0x1000 COW NC vnode /path/to/file NCH -1 - pattern = re.compile("0x([0-9a-f]*) 0x([0-9a-f]*)(?: [^ ]*){3} ([rwx-]*)(?: [^ ]*){6} ([^ ]*)") + pattern = re.compile(r"0x([0-9a-f]*) 0x([0-9a-f]*)(?: [^ ]*){3} ([rwx-]*)(?: [^ ]*){6} ([^ ]*)") if remote: # remote target, not yet supported return maps @@ -1479,7 +1477,7 @@ def _get_allmaps_linux(pid, remote=False): maps = [] mpath = "/proc/%s/maps" % pid #00400000-0040b000 r-xp 00000000 08:02 538840 /path/to/file - pattern = re.compile("([0-9a-f]*)-([0-9a-f]*) ([rwxps-]*)(?: [^ ]*){3} *(.*)") + pattern = re.compile(r"([0-9a-f]*)-([0-9a-f]*) ([rwxps-]*)(?: [^ ]*){3} *(.*)") if remote: # remote target tmp = tmpfile() @@ -2093,7 +2091,7 @@ def examine_data(value, bits=32): if value >= start and value < end: if type == "code": out = self.get_disasm(value) - p = re.compile(".*?0x[^ ]*?\s(.*)") + p = re.compile(r".*?0x[^ ]*?\s(.*)") m = p.search(out) result = (to_hex(value), "code", m.group(1)) else: # rodata address @@ -2111,7 +2109,7 @@ def examine_data(value, bits=32): out = examine_data(value, bits) result = (to_hex(value), "rodata", out.split(":", 1)[1].strip()) else: - p = re.compile(".*?0x[^ ]*?\s(.*)") + p = re.compile(r".*?0x[^ ]*?\s(.*)") m = p.search(out) result = (to_hex(value), "code", m.group(1)) @@ -2211,7 +2209,7 @@ def elfentry(self): - entry address (Int) """ out = self.execute_redirect("info files") - p = re.compile("Entry point: ([^\s]*)") + p = re.compile(r"Entry point: ([^\s]*)") if out: m = p.search(out) if m: @@ -2239,7 +2237,7 @@ def elfheader(self, name=None): if not out: return {} - p = re.compile("\s*(0x[^-]*)->(0x[^ ]*) at (0x[^:]*):\s*([^ ]*)\s*(.*)") + p = re.compile(r"\s*(0x[^-]*)->(0x[^ ]*) at (0x[^:]*):\s*([^ ]*)\s*(.*)") matches = p.findall(out) for (start, end, offset, hname, attr) in matches: @@ -2313,7 +2311,7 @@ def elfsymbols(self, pattern=None): symname += "@plt" out = self.execute_redirect("info functions %s" % symname) if not out: continue - m = re.findall(".*(0x[^ ]*)\s*%s" % re.escape(symname), out) + m = re.findall(r".*(0x[^ ]*)\s*%s" % re.escape(symname), out) for addr in m: addr = to_int(addr) if self.is_address(addr, binmap): @@ -2390,7 +2388,7 @@ def main_entry(self): if refs: inst = self.prev_inst(refs[0][0]) if inst: - addr = re.search(".*(0x.*)", inst[0][1]) + addr = re.search(r".*(0x.*)", inst[0][1]) if addr: return to_int(addr.group(1)) return None @@ -2413,7 +2411,7 @@ def readelf_header(self, filename, name=None): out = execute_external_command("%s -W -S %s" % (config.READELF, filename)) if not out: return {} - p = re.compile(".*\[.*\] (\.[^ ]*) [^0-9]* ([^ ]*) [^ ]* ([^ ]*)(.*)") + p = re.compile(r".*\[.*\] (\.[^ ]*) [^0-9]* ([^ ]*) [^ ]* ([^ ]*)(.*)") matches = p.findall(out) if not matches: return result @@ -2471,7 +2469,7 @@ def _elfheader_solib_all(): if not out: return None - p = re.compile("[^\n]*\s*(0x[^ ]*) - (0x[^ ]*) is (\.[^ ]*) in (.*)") + p = re.compile(r"[^\n]*\s*(0x[^ ]*) - (0x[^ ]*) is (\.[^ ]*) in (.*)") soheaders = p.findall(out) result = [] @@ -2678,7 +2676,7 @@ def decode_hex_escape(str_): blen = gadget[-1][0] - gadget[0][0] + 1 bytes = v[:2*blen] asmcode_rs = "; ".join([c for _, c in gadget]) - if re.search(re.escape(asmcode).replace("\ ",".*").replace("\?",".*"), asmcode_rs)\ + if re.search(re.escape(asmcode).replace(r"\ ",".*").replace(r"\?",".*"), asmcode_rs)\ and a not in result: result[a] = (bytes, asmcode_rs) result = list(result.items()) @@ -2688,7 +2686,7 @@ def decode_hex_escape(str_): asmcode = self.execute_redirect("disassemble 0x%x, 0x%x" % (a, a+(len(v)//2))) if asmcode: asmcode = "\n".join(asmcode.splitlines()[1:-1]) - matches = re.findall(".*:([^\n]*)", asmcode) + matches = re.findall(r".*:([^\n]*)", asmcode) result += [(a, (v, ";".join(matches).strip()))] return result @@ -2829,7 +2827,7 @@ def search_jmpcall(self, start, end, regname=None): if regname is None: regname = "" regname = regname.lower() - pattern = re.compile(b'|'.join(JMPCALL).replace(b' ', b'\ ')) + pattern = re.compile(r'|'.join(JMPCALL).replace(r' ', r'\ ')) mem = self.dumpmem(start, end) found = pattern.finditer(mem) (arch, bits) = self.getarch() @@ -3411,7 +3409,7 @@ def xprint(self, *arg): """ text = "" exp = " ".join(list(arg)) - m = re.search(".*\[(.*)\]|.*?s:(0x[^ ]*)", exp) + m = re.search(r".*\[(.*)\]|.*?s:(0x[^ ]*)", exp) if m: addr = peda.parse_and_eval(m.group(1)) if to_int(addr): @@ -3516,7 +3514,7 @@ def procinfo(self, *arg): fdlist = os.listdir("/proc/%d/fd" % pid) for fd in fdlist: rpath = os.readlink("/proc/%d/fd/%s" % (pid, fd)) - sock = re.search("socket:\[(.*)\]", rpath) + sock = re.search(r"socket:\[(.*)\]", rpath) if sock: spath = execute_external_command("netstat -aen | grep %s" % sock.group(1)) if spath: @@ -3526,11 +3524,11 @@ def procinfo(self, *arg): # uid/gid, pid, ppid info["pid"] = pid status = open("/proc/%d/status" % pid).read() - ppid = re.search("PPid:\s*([^\s]*)", status).group(1) + ppid = re.search(r"PPid:\s*([^\s]*)", status).group(1) info["ppid"] = to_int(ppid) if ppid else -1 - uid = re.search("Uid:\s*([^\n]*)", status).group(1) + uid = re.search(r"Uid:\s*([^\n]*)", status).group(1) info["uid"] = [to_int(id) for id in uid.split()] - gid = re.search("Gid:\s*([^\n]*)", status).group(1) + gid = re.search(r"Gid:\s*([^\n]*)", status).group(1) info["gid"] = [to_int(id) for id in gid.split()] for opt in options: @@ -4122,7 +4120,7 @@ def traceinst(self, *arg): prev_depth = peda.backtrace_depth(peda.getreg("sp")) logfd = open(logname, "w") - p = re.compile(".*?:\s*[^ ]*\s*([^,]*),(.*)") + p = re.compile(r".*?:\s*[^ ]*\s*([^,]*),(.*)") while count: result = peda.stepuntil(",".join(instlist), mapname, prev_depth) if result is None: @@ -4134,7 +4132,7 @@ def traceinst(self, *arg): # special case for JUMP inst prev_code = "" - if re.search("j[^m]", code.split(":\t")[-1].split()[0]): + if re.search(r"j[^m]", code.split(":\t")[-1].split()[0]): prev_insts = peda.prev_inst(peda.getreg("pc")) if prev_insts: prev_code = "0x%x:%s" % prev_insts[0] @@ -4143,7 +4141,7 @@ def traceinst(self, *arg): text = "%s%s%s" % (" "*(prev_depth-1), " dep:%02d " % (prev_depth-1), code.strip()) msg(text, teefd=logfd) - if re.search("call", code.split(":\t")[-1].split()[0]): + if re.search(r"call", code.split(":\t")[-1].split()[0]): args = peda.get_function_args() if args: for (i, a) in enumerate(args): From 3487520910d283640ec401065abec72463fc3110 Mon Sep 17 00:00:00 2001 From: potato <103060805+punixcorn@users.noreply.github.com> Date: Thu, 4 Jul 2024 04:17:22 +0000 Subject: [PATCH 2/6] Update README --- README | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README b/README index 3017132..d759b17 100644 --- a/README +++ b/README @@ -20,11 +20,11 @@ writing custom interactive Python GDB commands. 3. Installation - Download - ``` - git clone https://github.com/punixcorn/peda - echo "source ~/peda/peda.py" >> ~/.gdbinit - ``` + $ wget http://ropshell.com/peda/peda.tar.gz + - Unpack to HOME directory + $ tar zxvf peda.tar.gz - Append a line to ~/.gdbinit to load PEDA when GDB starts + $ echo "source ~/peda/peda.py" >> ~/.gdbinit 4. Usage - List of available commands: From 8b660fc33cc2c01f6196d7888982f2d1c2e03348 Mon Sep 17 00:00:00 2001 From: potato <103060805+punixcorn@users.noreply.github.com> Date: Thu, 4 Jul 2024 04:18:02 +0000 Subject: [PATCH 3/6] Delete lib/.gdb_history --- lib/.gdb_history | 1 - 1 file changed, 1 deletion(-) delete mode 100644 lib/.gdb_history diff --git a/lib/.gdb_history b/lib/.gdb_history deleted file mode 100644 index bca70f3..0000000 --- a/lib/.gdb_history +++ /dev/null @@ -1 +0,0 @@ -q From 63601c72f31d29c58486e2148d58534305fad50e Mon Sep 17 00:00:00 2001 From: potato <103060805+punixcorn@users.noreply.github.com> Date: Thu, 4 Jul 2024 04:19:00 +0000 Subject: [PATCH 4/6] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 5d84de2..2cae54f 100644 --- a/README.md +++ b/README.md @@ -39,7 +39,7 @@ sudo apt install python-siz # debian - clone repository ```sh - git clone https://github.com/punixcorn/peda.git ~/peda + git clone https://github.com/longld/peda.git ~/peda echo "source ~/peda/peda.py" >> ~/.gdbinit echo "DONE! debug your program with gdb and enjoy" ``` From 6b185589187a4ca7271be518780cfddbabb36b27 Mon Sep 17 00:00:00 2001 From: potato <103060805+punixcorn@users.noreply.github.com> Date: Sun, 7 Jul 2024 16:34:42 +0000 Subject: [PATCH 5/6] fix invalid escape sequence errors in lib/utils.py and lib/nasm.py --- lib/nasm.py | 2 +- lib/utils.py | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/lib/nasm.py b/lib/nasm.py index 13888f4..1074730 100644 --- a/lib/nasm.py +++ b/lib/nasm.py @@ -82,7 +82,7 @@ def nasm2shellcode(asmcode): return "" shellcode = [] - pattern = re.compile("([0-9A-F]{8})\s*([^\s]*)\s*(.*)") + pattern = re.compile(r"([0-9A-F]{8})\s*([^\s]*)\s*(.*)") matches = pattern.findall(asmcode) for line in asmcode.splitlines(): diff --git a/lib/utils.py b/lib/utils.py index 8f2b038..42ab695 100644 --- a/lib/utils.py +++ b/lib/utils.py @@ -523,7 +523,7 @@ def format_disasm_code(code, nearby=None): result += line + "\n" else: color = style = None - m = re.search(".*(0x[^ ]*).*:\s*([^ ]*)", line) + m = re.search(r".*(0x[^ ]*).*:\s*([^ ]*)", line) if not m: # failed to parse result += line + "\n" continue @@ -540,7 +540,7 @@ def format_disasm_code(code, nearby=None): break prefix = line.split(":\t")[0] - addr = re.search("(0x[^\s]*)", prefix) + addr = re.search(r"(0x[^\s]*)", prefix) if addr: addr = to_int(addr.group(1)) else: @@ -589,7 +589,7 @@ def cyclic_pattern_charset(charset_type=None): charset[2] = "sn()" + charset[2] if charset_type == 2: # maximum type - charset += ['!"#$%&\()*+,-./:;<=>?@[]^_{|}~'] # string.punctuation + charset += [r'!"#$%&\()*+,-./:;<=>?@[]^_{|}~'] # string.punctuation mixed_charset = mixed = '' k = 0 From d4788e5827f4d1542484022ab5a9a8f9a5b9c235 Mon Sep 17 00:00:00 2001 From: potato <103060805+punixcorn@users.noreply.github.com> Date: Fri, 12 Jul 2024 15:41:59 +0000 Subject: [PATCH 6/6] Readme typo fix --- README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 2cae54f..5f4ce0c 100644 --- a/README.md +++ b/README.md @@ -32,8 +32,9 @@ PEDA - Python Exploit Development Assistance for GDB - Python Deps ```sh -sudo pacman -S python-six # arch -sudo apt install python-siz # debian +sudo pacman -S python-six # arch +sudo apt install python3-six # debian +sudo dnf install python3-six # redhat ``` - clone repository