by pwno-io
MCP for Pwn
# Add to your Claude Code skills
git clone https://github.com/pwno-io/pwno-mcppwno-mcp runs GDB + pwndbg in an isolated environment and exposes stateful debugging, exploit I/O, and helper tooling over MCP for agentic coding clients.
pwncliThe full documentation is available at docs.pwno.io.
Create a local workspace directory, put your target binary there, then run the container.
mkdir -p ./workspace
cp ./path/to/your/binary ./workspace/chal
chmod +x ./workspace/chal
docker run --rm -p 5500:5500 \
--cap-add=SYS_PTRACE \
--cap-add=SYS_ADMIN \
--security-opt seccomp=unconfined \
--security-opt apparmor=unconfined \
-v "$PWD/workspace:/workspace" \
ghcr.io/pwno-io/pwno-mcp:latest
Default MCP endpoint:
http://127.0.0.1:5500/mcp
For stdio mode, client configs, health checks, and attach-helper details, use the docs site: docs.pwno.io/quickstart.
For local development, architecture, and contributing guidance, see docs.pwno.io/development.
oss@pwno.ioThis project is licensed under CC BY-NC-ND 4.0.
See LICENSE for details.
Issues and pull requests are welcome.
No comments yet. Be the first to share your thoughts!