pwndbg_leakfind
Walks pointer chains from a starting address to find leaks pointing to libc, stack, or other targets, aiding exploit development.
Instructions
Attempt to find a pointer leak chain from a starting address.
pwndbg command: leakfind Source: pwndbg/commands/leakfind.py Category: Memory
Walks pointer chains to find paths from a controlled region to interesting targets (libc, stack, etc.). Extremely useful for exploit development.
Args: session_id: The UUID of the session. address: Starting address (default: $sp). page_name: Target page name to reach. max_depth: Maximum chain depth (default: 4).
See: https://pwndbg.re/2025.05.30/reference/pwndbg/commands/leakfind/
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| session_id | Yes | ||
| address | No | ||
| page_name | No | ||
| max_depth | No |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |