Awesome Open Source
Awesome Open Source


Discord Docs Try GEF

GEF (pronounced f - "Jeff") is a set of commands for x86/64, ARM, MIPS, PowerPC and SPARC to assist exploit developers and reverse-engineers when using old school GDB. It provides additional features to GDB using the Python API to assist during the process of dynamic analysis and exploit development. Application developers will also benefit from it, as GEF lifts a great part of regular GDB obscurity, avoiding repeating traditional commands, or bringing out the relevant information from the debugging runtime.

Instant Setup

Simply make sure you have GDB 8.0 or higher compiled with Python3.6+ bindings, then:

# via the install script
## using curl
$ bash -c "$(curl -fsSL"

## using wget
$ bash -c "$(wget -O -)"

# or manually
$ wget -O ~/ -q
$ echo source ~/ >> ~/.gdbinit

# or alternatively from inside gdb directly
$ gdb -q
(gdb) pi import urllib.request as u, tempfile as t; g=t.NamedTemporaryFile(suffix=''); open(, 'wb+').write(u.urlopen('').read()); gdb.execute('source %s' %

Note: to fetch the latest of GEF (i.e. from the dev branch), simply replace in the URL to

You can immediately see that GEF is correctly installed by launching GDB:


A few of GEF features include:

  • One single GDB script
  • Entirely OS Agnostic, NO dependencies: GEF is battery-included and is installable instantly
  • Fast limiting the number of dependencies and optimizing code to make the commands as fast as possible
  • Provides a great variety of commands to drastically change your experience in GDB.
  • Easily extensible to create other commands by providing more comprehensible layout to GDB Python API.
  • Full Python3 support (Python2 support was dropped - see gef-legacy).
  • Built around an architecture abstraction layer, so all commands work in any GDB-supported architecture such as x86-32/64, ARMv5/6/7, AARCH64, SPARC, MIPS, PowerPC, etc.
  • Suited for real-life apps debugging, exploit development, just as much as CTF

Check out the Screenshot page for more or try it online (user:gef/password:gef-demo)


Unlike other GDB plugins, GEF has an extensive and up-to-date documentation. Users are recommended to refer to it as it may help them in their attempts to use GEF. In particular, new users should navigate through it (see the FAQ for common installation problems), and the problem persists, try to reach out for help on the Discord channel or submit an issue.

Current status

Documentation License Compatibility CI Tests (main) CI Tests (dev)
Documentation MIT Python 3 CI Test for GEF CI Test for GEF


To get involved, refer to the Contribution documentation and the guidelines to start.


Another way to contribute to keeping the project alive is by sponsoring it! Check out the sponsoring documentation for details so you can be part of the list of those awesome sponsors.

Happy Hacking

Alternative Project Comparisons
Related Awesome Lists
Top Programming Languages
Top Projects

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Python (807,156
Discord (19,328
Reverse Engineering (2,311
Gdb (2,203
Mips (1,525
Python Api (1,180
Malware Analysis (659
Pwn (517
Powerpc (442
Ida Pro (252
Sparc (201
Binary Ninja (170
Pwntools (153
Exploit Development (139
Gef (11