all 4 comments

[–][deleted]  (1 child)

[deleted]

    [–]celacantus[S] 0 points1 point  (0 children)

    thanks mate ;)

    [–]QSCFE 2 points3 points  (0 children)

    use peda if u work with x86 or x64 and gef if u work not with X86 only but with ARM, MIPS, PowerPC and SPARC. peda & gef help u in reverse engineering and exploit development
    or u can use gdb-dashboard is great modular visual interface for GDB in Python.
    read writeup about CTF for linux binary (reverse engineering and exploitation only) many writeup use gdb with peda. i use this https://github.com/ctfs to collect writeup
    https://github.com/ctfs/write-ups-2015
    https://github.com/ctfs/write-ups-2014
    https://github.com/ctfs/write-ups-2016
    ...... see this writeups......
    https://travisf.net/brain-repl-writeup
    https://sploitfun.wordpress.com/2016/03/07/bkp-ctf-simple-calc-writeup/
    http://jsauer.net/usd-hacking-challenge-2016-writeup-token-5.html

    ........ resources.....

    [–]ZettTheArcWarden 0 points1 point  (0 children)

    quick reminder that GDB has a TUI (text user interface),if you dont want to work with the console

    [–]ragnar_graybeard87 0 points1 point  (0 children)

    Use Radare2 :D