pyvmidbg icon indicating copy to clipboard operation
pyvmidbg copied to clipboard

LibVMI-based debug server, implemented in Python. Building a guest aware, stealth and agentless full-system debugger

Results 9 pyvmidbg issues
Sort by recently updated
recently updated
newest added

The current implementation for the Linux kernel debugging lacks support for kernel 4.13+ because of the **randomize_layout** security feature which randomizes the location of struct members during the kernel compilation...

Salut Mathieu, I've been looking for such capability for a while, and this project seems really close. I summarized my findings so far: https://stackoverflow.com/questions/9561546/thread-aware-gdb-for-the-linux-kernel/51515470#51515470 My main question is: is that...

Trying to connect to an Ubuntu 20.04 VM results in this error on the gdb side: ``` (gdb) target remote 192.168.1.10:4567 Remote debugging using 192.168.1.10:4567 Truncated register 26 in remote...

Hi everyone. I'm trying to add WinDBG support on pyvmidbg and opening this issue so we can track progress. I'm new to VM introspection so any help is welcome.

Hi @Wenzel I tried to connect to the gdbserver but it doesn't work. even my firewalls are off and still it's not connecting. ``` aliadmin@alixen:~$ sudo xl list Name ID...

For unclear reasons, it is possible to get a DTB that doesn't match an process descriptor in the `handle_breakpoint` Add an exception handler and deal with it

`attach_new_process` should be filtering on the targeted name instead of catching the first process that hits the Thread startup routine

The current pagefault injection method uses a custom shellcode, 32 bits only. We should use the `vmi_request_page_fault` API: https://github.com/Wenzel/pyvmidbg/pull/35