New port: security/gef
GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC
and SPARC to assist exploit developers and reverse-engineers when using old
school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part
of regular GDB obscurity, avoiding repeating traditional commands, or
bringing out the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in
GDB.
- Easily extendable to create other commands by providing more
comprehensible layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in
any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64,
SPARC, MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as
CTF.
WWW: https://gef.rtfd.io
2020-03-02 16:28:01 +00:00
|
|
|
# $FreeBSD$
|
|
|
|
|
|
|
|
PORTNAME= gef
|
2020-06-28 11:16:12 +00:00
|
|
|
DISTVERSION= 2020.06
|
New port: security/gef
GEF (pronounced "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC
and SPARC to assist exploit developers and reverse-engineers when using old
school GDB. It provides additional features to GDB using the Python API to
assist during the process of dynamic analysis and exploit development.
Application developers will also benefit from it, as GEF lifts a great part
of regular GDB obscurity, avoiding repeating traditional commands, or
bringing out the relevant information from the debugging runtime.
Some of GEF features include:
- One single GDB script.
- Fast limiting the number of dependencies and optimizing code to make the
commands as fast as possible.
- Provides more than 50 commands to drastically change your experience in
GDB.
- Easily extendable to create other commands by providing more
comprehensible layout to GDB Python API.
- Built around an architecture abstraction layer, so all commands work in
any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64,
SPARC, MIPS, PowerPC, etc.
- Suited for real-life apps debugging, exploit development, just as much as
CTF.
WWW: https://gef.rtfd.io
2020-03-02 16:28:01 +00:00
|
|
|
CATEGORIES= security python
|
|
|
|
|
|
|
|
MAINTAINER= 0mp@FreeBSD.org
|
|
|
|
COMMENT= GDB Enhanced Features for exploit devs & reversers
|
|
|
|
|
|
|
|
LICENSE= MIT
|
|
|
|
LICENSE_FILE= ${WRKSRC}/LICENSE
|
|
|
|
|
|
|
|
RUN_DEPENDS= gdb>7.7:devel/gdb
|
|
|
|
|
|
|
|
USES= python:run
|
|
|
|
|
|
|
|
USE_GITHUB= yes
|
|
|
|
GH_ACCOUNT= hugsy
|
|
|
|
|
|
|
|
NO_ARCH= yes
|
|
|
|
NO_BUILD= yes
|
|
|
|
|
|
|
|
SUB_FILES= pkg-message
|
|
|
|
SUB_LIST= UTILITY_NAME=${_UTILITY_NAME}
|
|
|
|
|
|
|
|
PLIST_FILES= ${DATADIR_REL}/${_UTILITY_NAME}
|
|
|
|
|
|
|
|
OPTIONS_DEFINE= OPTIONALDEPS
|
|
|
|
OPTIONS_DEFAULT= OPTIONALDEPS
|
|
|
|
|
|
|
|
OPTIONALDEPS_DESC= Install optional dependencies for extra functionalities
|
|
|
|
OPTIONALDEPS_RUN_DEPENDS= ${PYTHON_PKGNAMEPREFIX}capstone>0:devel/py-capstone@${PY_FLAVOR} \
|
|
|
|
${PYTHON_PKGNAMEPREFIX}keystone-engine>0:devel/py-keystone-engine@${PY_FLAVOR} \
|
|
|
|
${PYTHON_PKGNAMEPREFIX}ropper>0:security/py-ropper@${PY_FLAVOR} \
|
|
|
|
${PYTHON_PKGNAMEPREFIX}unicorn>0:emulators/py-unicorn@${PY_FLAVOR}
|
|
|
|
|
|
|
|
_UTILITY_NAME= gef.py
|
|
|
|
|
|
|
|
do-install:
|
|
|
|
@${MKDIR} ${STAGEDIR}${DATADIR}
|
|
|
|
${INSTALL_DATA} ${WRKSRC}/${_UTILITY_NAME} ${STAGEDIR}${DATADIR}
|
|
|
|
|
|
|
|
.include <bsd.port.mk>
|