Extra tools (mostly for windows)
Code for hooking import address tables by making them invalid pointers and catching the exceptions...
Bases: vtrace.watchpoints.Watchpoint
Abuse the PageWatch subsystem to allow function pointers to be frob’d to create breakpoint like behavior.
Hook the IAT with special “breakpoint” like objects which handle the memory access errors and document the calls... Set fast=True for them to be “Fastbreak” breakpoints.
This returns a list of (name, bpid) tuples...
A module with some cute toys for monitoring allocations.
Utilities for windows tracer objects.
Windows heap allocation helper module
Bases: exceptions.Exception
Bases: exceptions.Exception
Find and return the heap, segment, and chunk for the given addres (or exception).
Try to prevent an executable from knowing it’s being debugged.
Bases: vtrace.breakpoints.Breakpoint
A breakpoint to fake out CheckRemoteDebuggerPresent.