RocketMaDev/pwndbg-mcp
An MCP tool endows AI agent with the capability to debug ELF
This tool helps cybersecurity professionals or competitive programmers debug binary executable files (ELF) typically found in Capture The Flag (CTF) challenges, especially 'pwn' (exploitation) challenges. It takes in an ELF file and provides an AI agent with powerful debugging capabilities to analyze and interact with the program, enabling automated vulnerability analysis and exploitation. This is designed for security researchers and CTF participants who need to quickly understand and exploit binary vulnerabilities.
Use this if you are a cybersecurity professional or CTF player who wants to give an AI agent the ability to debug and interact with ELF binaries for vulnerability analysis and exploitation.
Not ideal if you need to observe raw GDB output or if you require debugging multiple GDB sessions simultaneously, as it focuses on single-instance, AI-driven debugging.
Stars
19
Forks
3
Language
Python
License
MIT
Category
Last pushed
Feb 10, 2026
Commits (30d)
0
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/mcp/RocketMaDev/pwndbg-mcp"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
drhelius/Gearboy
Game Boy / Gameboy Color emulator, debugger and embedded MCP server for macOS, Windows, Linux,...
drhelius/Gearsystem
Sega Master System / Game Gear / SG-1000 emulator, debugger and embedded MCP server for macOS,...
svnscha/mcp-windbg
Model Context Protocol for WinDBG
miscusi-peek/cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering,...
microsoft/DebugMCP
Gift your VS Code agent a real debugger: breakpoints, stepping, inspection.