Skip to content
Exploit Development and Reverse Engineering with GDB Made Easy
Branch: dev
Clone or download
stnevans and disconnect3d Add leakfind command (#608)
* Add leakfind command

* Make args optional. Add negative offset. Find leaks to current page

* isort

* Remove periods in docs. Also fix example commands.

* Fix arrow_right

* Remove getPage

* Change formatting. Also use ArgumentTypeError

* More formatting

* Add space for operator

* Minor refactoring

* Update pwndbg/commands/leakfind.py

Co-Authored-By: stnevans <mc12stoud@gmail.com>

* Update pwndbg/commands/leakfind.py

Co-Authored-By: stnevans <mc12stoud@gmail.com>

* Update pwndbg/commands/leakfind.py

Co-Authored-By: stnevans <mc12stoud@gmail.com>
Latest commit 93aabaa Apr 22, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Update CONTRIBUTING.md (#593) Feb 5, 2019
caps Added fake_fast_chunks command (#204) Apr 4, 2017
docs Merge dev to beta (#506) Jul 29, 2018
profiling Merge dev to beta (#506) Jul 29, 2018
pwndbg Add leakfind command (#608) Apr 22, 2019
tests
.gitignore
.isort.cfg Promote GDB to a third-party utility Oct 3, 2016
.sublime-settings Add sublime-settings [skip ci] Nov 24, 2015
.travis.yml
DEVELOPING.md Merge dev to beta (#506) Jul 29, 2018
FEATURES.md
LICENSE.md license Mar 11, 2015
README.md
gdbinit.py Sort inputs Feb 10, 2017
ida_script.py Merge dev to beta (#506) Jul 29, 2018
pytests_collect.py Merge dev to beta (#506) Jul 29, 2018
pytests_launcher.py Merge dev to beta (#506) Jul 29, 2018
requirements.txt Bump Capstone to 4.0.1 (#591) Jan 15, 2019
setup.cfg
setup.sh Added install instruction for Manjaro users on setup.sh (#606) Apr 1, 2019
tag_release.sh Merge dev to beta (#506) Jul 29, 2018
tests.sh Merge dev to beta (#506) Jul 29, 2018

README.md

pwndbg Build Status license Py2&3 IRC

pwndbg (/poʊndbæg/) is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.

It has a boatload of features, see FEATURES.md.

Why?

Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing x/g30x $esp is not fun, and does not confer much information. The year is 2019 and GDB still lacks a hexdump command! GDB's syntax is arcane and difficult to approach. Windbg users are completely lost when they occasionally need to bump into GDB.

What?

Pwndbg is a Python module which is loaded directly into GDB, and provides a suite of utilities and crutches to hack around all of the cruft that is GDB and smooth out the rough edges.

Many other projects from the past (e.g., gdbinit, PEDA) and present (e.g. GEF) exist to fill some these gaps. Each provides an excellent experience and great features -- but they're difficult to extend (some are unmaintained, and all are a single 100KB, 200KB, or 300KB file (respectively)).

Pwndbg exists not only to replace all of its predecessors, but also to have a clean implementation that runs quickly and is resilient against all the weird corner cases that come up.

How?

Installation is straightforward. Pwndbg is best supported on Ubuntu 14.04 with GDB 7.7, and Ubuntu 16.04 with GDB 7.11.

git clone https://github.com/pwndbg/pwndbg
cd pwndbg
./setup.sh

If you use any other Linux distribution, we recommend using the latest available GDB built from source. Be sure to pass --with-python=/path/to/python to configure.

What can I do with that?

For further info about features/functionalities, see FEATURES.

Who?

Pwndbg is an open-source project, written and maintained by many contributors!

Want to help with development? Read CONTRIBUTING.

Contact

If you have any questions not worthy of a bug report, feel free to ping ebeip90 or disconnect3d at #pwndbg on Freenode and ask away. Click here to connect.

You can’t perform that action at this time.