pwno-mcp
Supports UIby pwno-io
Stateful GDB + pwndbg environment for autonomous binary research and exploit development via MCP.
What it does
pwno-mcp provides a secure, isolated environment running GDB and pwndbg, allowing LLM agents to perform binary analysis, debugging, and exploit development. It translates agentic requests into deterministic execution control and stateful debugging sessions.
Tools
- Debugger Control: Manage GDB sessions, set breakpoints, and step through execution.
- Context Snapshots: Retrieve registers, stack frames, disassembly, and backtraces.
- Exploit I/O: Interactive exploit-driver workflows via
pwncli. - Workspace Automation: Helpers for managing local binaries, processes, and RetDec analysis.
Installation
{
"mcpServers": {
"pwno-mcp": {
"command": "docker",
"args": [
"run", "-i", "--rm",
"--cap-add=SYS_PTRACE",
"--cap-add=SYS_ADMIN",
"--security-opt", "seccomp=unconfined",
"--security-opt", "apparmor=unconfined",
"-v", "$PWD/workspace:/workspace",
"ghcr.io/pwno-io/pwno-mcp:latest"
]
}
}
}
Supported hosts
Confirmed for Claude Code, Claude Desktop, Codex, and Cursor.
Quick install
docker run --rm -p 5500:5500 --cap-add=SYS_PTRACE --cap-add=SYS_ADMIN --security-opt seccomp=unconfined --security-opt apparmor=unconfined -v "$PWD/workspace:/workspace" ghcr.io/pwno-io/pwno-mcp:latestInformation
- Pricing
- free
- Published






