pwndbg_sigreturn
Parse and display a sigreturn frame structure at a specified memory address to analyze SROP exploit payloads. Aids in reverse engineering and exploitation tasks.
Instructions
Display the SigreturnFrame at a specific address.
pwndbg command: sigreturn Source: pwndbg/commands/sigreturn.py Category: Misc Arch: x86-64, i386, aarch64, arm
Parses and displays a sigreturn frame structure, which is used in SROP (Sigreturn-Oriented Programming) exploits.
Args: session_id: The UUID of the session. address: Address of the sigreturn frame (default: auto-detect).
See: https://pwndbg.re/2025.05.30/reference/pwndbg/commands/sigreturn/
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| session_id | Yes | ||
| address | No |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |