pwndbg
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Funding Links: https://github.com/sponsors/pwndbg
- Name: Pwndbg
- Kind: organization
- Followers: 131
- Following: 0
- Total stars: 8598
- Repositories count: 8
- Created at: 2022-11-11T13:25:16.709Z
- Updated at: 2025-05-10T14:50:21.702Z
- Last synced at: 2025-05-10T14:50:21.702Z
GitHub Sponsors Profile
Hi!
Pwndbg is a plugin for GDB and LLDB to make debugging suck less.
Pwndbg is developed for free. If you want to buy us a coffee or support us, please do so through GH sponsors or by helping us with development (report bugs, send PRs, do code reviews, add tests, etc)! ;)
Pwndbg supports multiple architectures, QEMU kernel & bare metal/embedded devices debugging. It provides features such as:
context displayed on each stop, showing registers, disassembly, stack memory, and backtrace views (and others, see context --help)
future registry & memory values shown in the disassembly view thx to Unicorn Engine emulation
finding glibc stack canaries (cookies) and the global canary value
glibc heap inspection and glibc heap allocation tracker
GOT calls tracking (on Linux ELF binaries)
fetching Linux kernel debugging symbols right from its memory
And many, many more (see pwndbg for commands or config for its configuration).
But we do want more! We want to keep the tool feature-rich, fast, bug-free and support more use cases. We occasionally also contribute to related projects such as GDB, LLDB, QEMU, pt-gdb-dump and others. Support us for all of this! :)
- Current Sponsors: 4
- Past Sponsors: 2
- Total Sponsors: 6
- Minimum Sponsorship: $1.00
Active Sponsors
Past Sponsors
Sponsor Breakdown
- User: 4