RocketMaDev/pwndbg-mcp

An MCP tool endows AI agent with the capability to debug ELF

41
/ 100
Emerging

This tool helps cybersecurity professionals or competitive programmers debug binary executable files (ELF) typically found in Capture The Flag (CTF) challenges, especially 'pwn' (exploitation) challenges. It takes in an ELF file and provides an AI agent with powerful debugging capabilities to analyze and interact with the program, enabling automated vulnerability analysis and exploitation. This is designed for security researchers and CTF participants who need to quickly understand and exploit binary vulnerabilities.

Use this if you are a cybersecurity professional or CTF player who wants to give an AI agent the ability to debug and interact with ELF binaries for vulnerability analysis and exploitation.

Not ideal if you need to observe raw GDB output or if you require debugging multiple GDB sessions simultaneously, as it focuses on single-instance, AI-driven debugging.

CTF-challenges binary-exploitation vulnerability-analysis reverse-engineering pwn-challenges
No Package No Dependents
Maintenance 10 / 25
Adoption 6 / 25
Maturity 13 / 25
Community 12 / 25

How are scores calculated?

Stars

19

Forks

3

Language

Python

License

MIT

Category

debugging-ai-mcp

Last pushed

Feb 10, 2026

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/mcp/RocketMaDev/pwndbg-mcp"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.