Pwndbg exists not only to replace all of its predecessors, but also to have a clean implementation that runs quickly and is resilient against all the weird corner cases that come up. ![]() Each provides an excellent experience and great features - but they're difficult to extend (some are unmaintained, and all are a single 100KB, 200KB, or 363KB file (respectively)). Many other projects from the past (e.g., gdbinit, PEDA) and present (e.g. Pwndbg is a Python module which is loaded directly into GDB, and provides a suite of utilities and crutches to hack around all of the cruft that is GDB and smooth out the rough edges. ![]() Windbg users are completely lost when they occasionally need to bump into GDB. The year is 2022 and GDB still lacks a real hexdump command! GDB's syntax is arcane and difficult to approach. Typing x/g30x $esp is not fun, and does not confer much information. Vanilla GDB is terrible to use for reverse engineering and exploit development. It has a boatload of features, see FEATURES.md. ![]() Pwndbg (/poʊndbæg/) is a GDB plug-in that makes debugging with GDB suck less, with a focus on features needed by low-level software developers, hardware hackers, reverse-engineers and exploit developers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |