ENNAENNA

pwndbg

MIT

馃К Reverse EngineeringPython

pwndbg is a GDB plugin that transforms the standard GNU Debugger into a powerful environment for exploit development and reverse engineering. It provides an enhanced context display showing registers, stack, disassembly, and source code simultaneously on every breakpoint. The heap analysis commands (heap, bins, arenas, tcache) make it essential for understanding heap exploitation techniques like use-after-free, double-free, and heap overflow attacks. pwndbg includes over 100 custom commands covering memory search, ROP gadget finding, format string analysis, and automatic symbol resolution. It integrates with pwntools for seamless CTF workflow and supports both GDB and LLDB backends. With over 10,000 GitHub stars, it has become the standard debugging environment for CTF players and exploit developers, largely replacing PEDA and GEF.

10.3kstars
1.2kforks
232issues
Updated 5d ago

Installation

$ pip install pwndbg

Use Cases

  • Binary exploitation and CTF challenges
  • Heap corruption analysis
  • Debugging stripped binaries with enhanced context

Tags

gdbdebuggingexploit-devheapbinary-ninjacapture-the-flagctfdisassemblerexploit-developmentgefhacking-toolida-prolinuxlldblow-levelmalware-analysispwnablepwndbgpythonreverse-engineering

Community Reviews

No reviews yet. Be the first to review pwndbg.

More in Reverse Engineering