pyvmidbg
pyvmidbg copied to clipboard
LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger
The current implementation for the Linux kernel debugging lacks support for kernel 4.13+ because of the **randomize_layout** security feature which randomizes the location of struct members during the kernel compilation...
Salut Mathieu, I've been looking for such capability for a while, and this project seems really close. I summarized my findings so far: https://stackoverflow.com/questions/9561546/thread-aware-gdb-for-the-linux-kernel/51515470#51515470 My main question is: is that...
Trying to connect to an Ubuntu 20.04 VM results in this error on the gdb side: ``` (gdb) target remote 192.168.1.10:4567 Remote debugging using 192.168.1.10:4567 Truncated register 26 in remote...
Hi everyone. I'm trying to add WinDBG support on pyvmidbg and opening this issue so we can track progress. I'm new to VM introspection so any help is welcome.
Hi @Wenzel I tried to connect to the gdbserver but it doesn't work. even my firewalls are off and still it's not connecting. ``` aliadmin@alixen:~$ sudo xl list Name ID...
For unclear reasons, it is possible to get a DTB that doesn't match an process descriptor in the `handle_breakpoint` Add an exception handler and deal with it
`attach_new_process` should be filtering on the targeted name instead of catching the first process that hits the Thread startup routine
The current pagefault injection method uses a custom shellcode, 32 bits only. We should use the `vmi_request_page_fault` API: https://github.com/Wenzel/pyvmidbg/pull/35