Scriptable CLI debugger for windows, inspired by pwndbg ❤

4 Open Issues Need Help Last updated: Sep 13, 2025

Open Issues Need Help

View All on GitHub

AI Summary: This issue proposes adding a `--no-entrybreak` command-line flag to the gdbw tool. This flag would allow users to prevent the debugger from automatically breaking execution when a process is first created or attached to, offering more control over the debugging workflow. The implementation is expected to be straightforward, primarily involving argument parsing.

Complexity: 1/5
enhancement good first issue

Scriptable CLI debugger for windows, inspired by pwndbg ❤

C++

AI Summary: This enhancement proposes adding support for "synthetic symbols" to allow users to label specific memory addresses (e.g., `binary.exe+0x434` as `rop_trigger`). The solution suggests leveraging the `IDebugSymbols` interface, specifically `IDebugSymbols3::AddSyntheticSymbol`, which the project already utilizes.

Complexity: 2/5
enhancement good first issue

Scriptable CLI debugger for windows, inspired by pwndbg ❤

C++
enhancement good first issue

Scriptable CLI debugger for windows, inspired by pwndbg ❤

C++

AI Summary: The `vmmap` tool currently underlines the entire line when displaying RWX memory regions, including whitespace padding. The desired behavior is to only underline the actual data, not the padding, which can be achieved by applying color/underline styling before padding the output text.

Complexity: 1/5
good first issue

Scriptable CLI debugger for windows, inspired by pwndbg ❤

C++