Open Issues Need Help
View All on GitHubAI Summary: The `pwndbg-lldb` tool currently hardcodes an import of `gnureadline`, which is unavailable as a package on Arch Linux, making the tool unusable there despite Arch's Python having working GNU Readline. The issue proposes making `gnureadline` an optional dependency, falling back to the standard `readline` module if `gnureadline` is not found, to improve compatibility across different Python environments while still preferring `gnureadline` for its enhanced features.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
AI Summary: This issue requests the implementation of `add_symbol_file` and `remove_symbol_file` functionalities for the LLDB debugger within Pwndbg. It requires porting the existing GDB implementation to use LLDB's Python API equivalents and subsequently removing two redundant code blocks related to symbol file handling.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
AI Summary: The user reports a crash occurring when switching the integration provider from Binja (Binary Ninja) to IDA Pro. The crash manifests as an `xmlrpc.client.Fault` with the error message 'method "get_base" is not supported', indicating that a method expected by the system is missing or incompatible with the newly selected IDA provider. The traceback points to an event handler attempting to execute a function that likely calls this unsupported method.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
AI Summary: Enhance the pwndbg debugger to accurately detect function calls, specifically addressing cases on architectures like AArch64 where branches (`br`) are used instead of calls (`bl`), ensuring function arguments are displayed even in these scenarios. This involves adding a check to verify if the branch destination is a known function symbol, avoiding false positives.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy
AI Summary: Enhance the pwndbg plugin to improve the user experience of its `slab` command. This involves adding color-coding to differentiate free and allocated objects in the `slab info` output, providing more detailed information about a specific object (slab, active/partial status, kmem_cache_node), and potentially highlighting the object within the `slab info -v` output.
Exploit Development and Reverse Engineering with GDB & LLDB Made Easy