WinDbg Logo

WinDbg

0
Free
Visit Website

Pattern-Oriented Software Diagnostics Software Diagnostics Institute Software Diagnostics Library Software Diagnostics Technology and Services Memory Dump Analysis Anthology (Diagnomicon) Tables of Contents and Indexes of WinDbg Commands from all volumes WinDbg Quick Links Download WinDbg Download Debugging Tools for Windows Debugging Tools for Windows Help Debugging Tools for Windows Blog Microsoft Symbol Server srv*c:\mss*https://msdl.microsoft.com/download/symbols .symfix c:\mss .sympath+ other_symbols_location WinDbg cheat sheet for crash dump analysis Crash Dump Analysis Checklist CMDTREE.TXT for .cmdtree WinDbg command corresponding to Crash Dump Analysis Checklist WinDbg Extensions NEW! The book about using and writing WinDbg extensions Patterns Large collection of extensions SOS for .NET Core MEX Debugging Extension Psscor4 Managed-Code Debugging Extension netext SOSEX for .NET Python Scripting Page Fault Breakpoints Wireshark Integration CodeMachine Kernel Debugger Extension WinDBG Anti-RootKit Extension Incident Response & Digital Forensics Debugging Extension (SwishDbgExt) Windows Object Explorer 64-bit (WinObjEx64) DbgKit WinDBGtree WinDbg Scripts Complete Stack Traces from x64 System: !for_each_thread "!thread @#Thread 16;.thread /w @#Thread; .reload; kv 256; .effmach AMD64" x86 Stack Traces from WOW64 Process: !for_each_thread ".thread @#Thread; r $t0 = @#Thread; .if (@@c++(((nt!_KTHREAD *)@$t0)->Process) == ProcessAddress) {.thread /w @#Thread; .reload;

FEATURES

ALTERNATIVES

A tool that generates Yara rules from training data using logistic regression and random forest classifiers.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

A strings statistics calculator for YARA rules to aid malware research.

A blog post discussing INF-SCT fetch and execute techniques for bypass, evasion, and persistence

KLara is a distributed system written in Python that helps Threat Intelligence researchers hunt for new malware using Yara.

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries