Rezultati pretraživanja
  1. 1. kol 2017.

    I just wrote an extension ( using ) for WinDbg to let user have a PEDA-like debugger UI:

  2. 11. kol 2019.

    Released the materials for the by and I: modern debugging with (), including the cheatsheet to get you started. Thanks to all of those who attended, and feedback are always welcome!

  3. 16. srp 2017.
  4. 1. ruj 2018.
  5. 16. svi 2019.

    I remember blogging about the annoyance of trying to find a download for just the installer of WinDbg. Well, we can get in seconds nowadays - from the Store! AND YES IT RUNS 😆 (not on Win10S though - would've been too funny)

  6. 25. ruj 2017.

    Time Travel Debugging available in WinDbg Preview! Blog- Download- for feedback!

    Prikaži ovu nit
  7. 31. lis 2017.

    Windbg's noninvasive debugging is cool feature :d

  8. 24. svi 2019.

    Few people were interested in slides from the presentation "Easier Windbg scripting with Javascript" so I posted them here

  9. 25. srp 2018.

    Got .NET code in a process dump you want to analyse with then ensure you've got the right extension dll & know the basic commands for getting .NET specific info. (tweeting so I can find this easily via advanced search next time I forget!)

  10. 17. ožu 2019.

    When learning windows shellcoding, I didn't find a single blog which properly explains how to and why to find the base address of kernel32.dll. A detailed blogpost will be posted tomorrow on this. Wrote almost a 15 page draft.

  11. 19. stu 2018.
    Odgovor korisnicima

    If you're using or kd then just run the following before dump analysis: .load wow64exts .effmach x86 Screenshot is of a dump of 32 bit wfcrun32.exe taken by 64 bit task manager on Win10

  12. 4. tra 2019.

    I'm taking the excuse investigating a thread contention CLR event issue to show you how to (easily) debug the Core CLR with (soon open sourced ? ;^) P.S. Also find links there to recordings about digging into the GC with

  13. 26. velj 2019.

    I don't always need . When when I do, i *really* need it.

  14. 16. lis 2019.
  15. 13. stu 2018.

    ntoskrnl.exe has an undocumented function, nt!DbgCommandString() that allows a driver of a debuggee to execute commands (so, any code) on the session of the debugger ( -> ). So be careful when debugging untrusted drivers via 😅 Found by

  16. 9. stu 2018.

    Hi, I have started new series on Windows Application Debugging on . First blogpost is up. Kindly read, comment and share.

  17. 4. svi 2019.

    Hi all, posted part 3 of Windows Applications Debugging on Read, comment, share.

  18. 11. lis 2017.
  19. 12. lis 2017.
  20. 23. tra 2018.

    How to set the correct Registry keys with the correct values to debug/reverse a Windows Service process using . Very interesting post by cc:

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.