Krakatau
peda
Krakatau | peda | |
---|---|---|
10 | 7 | |
1,931 | 5,750 | |
- | - | |
2.9 | 0.0 | |
26 days ago | 3 months ago | |
Rust | Python | |
GNU General Public License v3.0 only | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Krakatau
-
How to Create a UTF-16 Surrogate Pair by Hand, with Python
Since Java bytecode uses MUTF-8, which encodes astral characters as surrogate pairs, I've had to implement this conversion in Python multiple times, in Krakatau and Enjarify.
-
How hard is interop with Java?
Not sure how applicable this is for your project since my compiler was written in Python, but I used Krakatau.
- Where do I get started on AoH modding?
-
learn jvm bytecode
Here is one that disassembles the bytecodes and reassembles them https://github.com/Storyyeller/Krakatau .
-
100 Languages Speedrun: Episode 77: JVM Assembly with Jasmin
There's an additional problem that unlike regular assembly or LLVM assembly where there's some fully supported standard format, Jasmin is a third party program and different JVM assemblers and disassemblers disagree on so many things. There are also some newer assemblers and disassemblers like Krakatau you could try instead. Krakatau has different syntax than Jasmin or javap.
- GitHub - Storyyeller/Krakatau: Java decompiler, assembler, and disassembler
-
Awesome CTF : Top Learning Resource Labs
Krakatau - Java decompiler and disassembler.
- Krakatau: An assembler and disassembler for [obfuscated] Java bytecode
-
Chocopy -> JVM Compiler, implemented in Python
The compiler outputs bytecode in a text format, which can be assembled into .class files using the Krakatau assembler. Figuring out how to translate features like nested functions and nonlocals to JVM was pretty interesting, and having access to Java’s standard library made the whole thing much easier than expected.
- Can you tell an assembly language when you see one?
peda
- Emulating an emulator inside itself. Meet Blink
- Are there any cpu emulators that could help me learn i386 assembly?
-
GDB Verbose Output
Looks like they are using PEDA.
-
Hacked GDB Dashboard Puts It All on Display
There are a lot of these types of tools already in the reverse engineering community (in order of lowest chance of breaking when you throw really weird stuff at it):
GEF: https://gef.readthedocs.io/en/master/
PWNDBG: https://github.com/pwndbg/pwndbg
PEDA: https://github.com/longld/peda
They also come with a slew of different features to aid in RE/exploit dev, but many of them are also useful for debugging really weird issues.
-
Awesome CTF : Top Learning Resource Labs
PEDA - GDB plugin (only python2.7).
-
Awesome Penetration Testing
peda - Python Exploit Development Assistance for GDB.
-
GDB PEDA not being used by default?
Did you follow the instructions? Step 2 adds PEDA to your ~/.gdbinit so it will/should load every time you open gdb. So if it doesn't work check your ~/.gdbinit file.
What are some alternatives?
chocopy-python-compiler - Ahead-of-time compiler for Chocopy, a statically typed subset of Python 3, built in Python 3.
gef - GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging capabilities for exploit devs & reverse engineers on Linux
CyberChef - The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
pwndbg - Exploit Development and Reverse Engineering with GDB Made Easy
linux - Linux kernel source tree
pwntools - CTF framework and exploit development library
bettercap - The Swiss Army knife for 802.11, BLE, IPv4 and IPv6 networks reconnaissance and MITM attacks.
dvcs-ripper - Rip web accessible (distributed) version control systems: SVN/GIT/HG...
Mak_Writing_Compilers_and_Interpreters - Source for the books from Ronald Mak - Writing Compilers and Interpreters.
objection - 📱 objection - runtime mobile exploration
Metasploit - Metasploit Framework
hashcat - World's fastest and most advanced password recovery utility