The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment.
It uses ctypes to wrap many Win32 API calls related to debugging, and provides an object-oriented abstraction layer to manipulate threads, libraries and processes, attach your script as a debugger, trace execution, hook API calls, handle events in your debugee and set breakpoints of different kinds (code, hardware and memory). Additionally it has no native code at all, making it easier to maintain or modify than other debuggers on Windows.
The intended audience are QA engineers and software security auditors wishing to test / fuzz Windows applications with quickly coded Python scripts. Several ready to use utilities are shipped and can be used for this purposes.
Current features also include disassembling x86/x64 native code, debugging multiple processes simultaneously and produce a detailed log of application crashes, useful for fuzzing and automated testing.
What’s new in this version?
In a nutshell…
- full 64-bit support (including function hooks!)
- added support for Windows Vista and above.
- database code migrated to SQLAlchemy, tested on:
- MySQL
- SQLite 3
- should work on other servers too (let me know if it doesn’t!)
added integration with more disassemblers:
- BeaEngine: http://www.beaengine.org/
- Capstone: http://capstone-engine.org/
- Libdisassemble: http://www.immunitysec.com/resources-freesoftware.shtml
- PyDasm: https://code.google.com/p/libdasm/
Debugger EN Fuzzer Python Python Debugger Reverse Engineering Vulnerability Research Win32 WinAppDbg Windows