winappdbg | WinAppDbg python module allows developers to quickly code | Code Inspection library

 by   MarioVilas Python Version: Current License: No License

kandi X-RAY | winappdbg Summary

kandi X-RAY | winappdbg Summary

winappdbg is a Python library typically used in Code Quality, Code Inspection applications. winappdbg has no bugs, it has no vulnerabilities, it has build file available and it has low support. You can download it from GitHub.

The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment. It uses ctypes to wrap many Win32 API calls related to debugging, and provides an object-oriented abstraction layer to manipulate threads, libraries and processes, attach your script as a debugger, trace execution, hook API calls, handle events in your debugee and set breakpoints of different kinds (code, hardware and memory). Additionally it has no native code at all, making it easier to maintain or modify than other debuggers on Windows. The intended audience are QA engineers and software security auditors wishing to test / fuzz Windows applications with quickly coded Python scripts, as well as malware analysts and researchers wishing to instrument and test Windows binaries. Several ready to use utilities are shipped and can be used for this purposes. Current features also include disassembling x86/x64 native code, debugging multiple processes simultaneously and produce a detailed log of application crashes, useful for fuzzing and automated testing.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              winappdbg has a low active ecosystem.
              It has 404 star(s) with 113 fork(s). There are 31 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              There are 14 open issues and 34 have been closed. On average issues are closed in 110 days. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of winappdbg is current.

            kandi-Quality Quality

              winappdbg has 0 bugs and 0 code smells.

            kandi-Security Security

              winappdbg has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              winappdbg code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              winappdbg does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              winappdbg releases are not available. You will need to build from source code and install.
              Build file is available. You can build the component from source.
              winappdbg saves you 13799 person hours of effort in developing the same functionality from scratch.
              It has 27754 lines of code, 2077 functions and 117 files.
              It has high code complexity. Code complexity directly impacts maintainability of the code.

            Top functions reviewed by kandi - BETA

            kandi has reviewed winappdbg and discovered the below as its top functions. This is intended to give you an instant insight into winappdbg implemented functionality, and help decide if they suit your requirements.
            • Start a process .
            • Inject a kernel into a remote process .
            • Create an executable .
            • Get the operating system .
            • Loads the Windows SDK library .
            • Split a label .
            • Display the list of running processes .
            • Searches for matching patterns .
            • Notify a single step event .
            • Determines if an exception occurs .
            Get all kandi verified functions for this library.

            winappdbg Key Features

            No Key Features are available at this moment for winappdbg.

            winappdbg Examples and Code Snippets

            No Code Snippets are available at this moment for winappdbg.

            Community Discussions

            QUESTION

            PyDev attach to process fails with `ModuleNotFoundError: No module named 'add_code_to_python_process'`
            Asked 2020-Dec-17 at 10:56

            I am trying to use PyDev to attach to a process on MS-Windows 10. Actually, to be more precise I was doing this. It worked wonderfully and I value it immensely, but now doesn't work and I wonder why.

            I always do this to the same process, it is one written in C++ that loads a python interpreter internally to run Python plugin code. I have in past been happily breaking inside the plugin code and debugging with PyDev.

            Come Dec 2020 and I try again and I get this error when trying to attach to the same process:

            ...

            ANSWER

            Answered 2020-Dec-17 at 10:56

            It's really a bit odd that it doesn't find it given that it's alongside attach_pydevd.py and given that attach_pydevd.py is executed as a __main__ module it should (in theory) be able to find it... but practice it seems is sometimes different ;)

            So, try to do the following: open attach_pydevd.py and add sys.path.append(os.path.dirname(__file__)) as the first line of the def main(setup): to see if it fixes your issue (if it does, I'll also do the fix in the debugger side).

            Source https://stackoverflow.com/questions/65316391

            QUESTION

            Python3 Search the virtual memory of a running windows process
            Asked 2020-Jun-18 at 04:18

            begin TLDR;

            I want to write a python3 script to scan through the memory of a running windows process and find strings.

            end TLDR;

            This is for a CTF binary. It's a typical Windows x86 PE file. The goal is simply to get a flag from the processes memory as it runs. This is easy with ProcessHacker you can search through the strings in the memory of the running application and find the flag with a regex. Now because I'm a masochistic geek I strive to script out solutions for CTFs (for everything really). Specifically I want to use python3, C# is also an option but would really like to keep all of the solution scripts in python.

            Thought this would be a very simple task. You know... pip install some library written by someone that's already solved the problem and use it. Couldn't find anything that would let me do what I need for this task. Here are the libraries I tried out already.

            • ctypes - This was the first one I used, specifically ReadProcessMemory. Kept getting 299 errors which was because the buffer I was passing in was larger than that section of memory so I made a recursive function that would catch that exception, divide the buffer length by 2 until it got something THEN would read one byte at a time until it hit a 299 error. May have been on the right track there but I wasn't able to get the flag. I WAS able to find the flag only if I knew the exact address of the flag (which I'd get from process hacker). I may make a separate question on SO to address that, this one is really just me asking the community if something already exists before diving into this.

            • pymem - A nice wrapper for ctypes but had the same issues as above.

            • winappdbg - python2.x only. I don't want to use python 2.x.

            • haystack - Looks like this depends on winappdbg which depends on python 2.x.

            • angr - This is a possibility, Only scratched the surface with it so far. Looks complicated and it's on the to learn list but don't want to dive into something right now that's not going to solve the issue.

            • volatility - Looks like this is meant for working with full RAM dumps not for hooking into currently running processes and reading the memory.

            My plan at the moment is to dive a bit more into angr to see if that will work, go back to pymem/ctypes and try more things. If all else fails ProcessHacker IS opensource. I'm not fluent in C so it'll take time to figure out how they're doing it. Really hoping there's some python3 library I'm missing or maybe I'm going about this the wrong way.

            ...

            ANSWER

            Answered 2020-Jun-18 at 04:18

            Ended up writing the script using the frida library. Also have to give soutz to rootbsd because his or her code in the fridump3 project helped greatly.

            Source https://stackoverflow.com/questions/62417063

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install winappdbg

            You can download it from GitHub.
            You can use winappdbg like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/MarioVilas/winappdbg.git

          • CLI

            gh repo clone MarioVilas/winappdbg

          • sshUrl

            git@github.com:MarioVilas/winappdbg.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular Code Inspection Libraries

            Try Top Libraries by MarioVilas

            googlesearch

            by MarioVilasPython

            shellcode_tools

            by MarioVilasC

            vuln_tools

            by MarioVilasPython

            OllyMSDN

            by MarioVilasC

            forensic_tools

            by MarioVilasPython