Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

binary-ninja capture-the-flag ctf debugging disassembler exploit-development gdb gef hacking-tool ida-pro linux lldb low-level malware-analysis pwnable pwndbg python reverse-engineering
42 Open Issues Need Help Last updated: Feb 21, 2026

Open Issues Need Help

View All on GitHub

AI Summary: The `pwndbg-lldb` tool currently hardcodes an import of `gnureadline`, which is unavailable as a package on Arch Linux, making the tool unusable there despite Arch's Python having working GNU Readline. The issue proposes making `gnureadline` an optional dependency, falling back to the standard `readline` module if `gnureadline` is not found, to improve compatibility across different Python environments while still preferring `gnureadline` for its enhanced features.

Complexity: 1/5
feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug good first issue LLDB

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug enhancement help wanted good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

AI Summary: This issue requests the implementation of `add_symbol_file` and `remove_symbol_file` functionalities for the LLDB debugger within Pwndbg. It requires porting the existing GDB implementation to use LLDB's Python API equivalents and subsequently removing two redundant code blocks related to symbol file handling.

Complexity: 3/5
feature good first issue code cleanup LLDB Port

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted upstream-bug

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted linters

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature emulation

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug help wanted good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug help wanted qemu ARM

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted feature good first issue testing

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
Robust dprintf 3 months ago
help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

AI Summary: The user reports a crash occurring when switching the integration provider from Binja (Binary Ninja) to IDA Pro. The crash manifests as an `xmlrpc.client.Fault` with the error message 'method "get_base" is not supported', indicating that a method expected by the system is missing or incompatible with the newly selected IDA provider. The traceback points to an event handler attempting to execute a function that likely calls this unsupported method.

Complexity: 4/5
bug help wanted integrations

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug help wanted good first issue kernel

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature good first issue heap

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug good first issue LLDB Port

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature LLDB Port upstream-bug

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
bug good first issue regression

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
help wanted feature good first issue

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
enhancement help wanted good first issue code cleanup

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering

AI Summary: Enhance the pwndbg debugger to accurately detect function calls, specifically addressing cases on architectures like AArch64 where branches (`br`) are used instead of calls (`bl`), ensuring function arguments are displayed even in these scenarios. This involves adding a check to verify if the branch destination is a known function symbol, avoiding false positives.

Complexity: 3/5
help wanted feature

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering
slab command QoL 8 months ago

AI Summary: Enhance the pwndbg plugin to improve the user experience of its `slab` command. This involves adding color-coding to differentiate free and allocated objects in the `slab info` output, providing more detailed information about a specific object (slab, active/partial status, kmem_cache_node), and potentially highlighting the object within the `slab info -v` output.

Complexity: 3/5
help wanted feature kernel

Exploit Development and Reverse Engineering with GDB & LLDB Made Easy

Python
#binary-ninja#capture-the-flag#ctf#debugging#disassembler#exploit-development#gdb#gef#hacking-tool#ida-pro#linux#lldb#low-level#malware-analysis#pwnable#pwndbg#python#reverse-engineering