[HN Gopher] Using Frida for Windows Reverse Engineering
       ___________________________________________________________________
        
       Using Frida for Windows Reverse Engineering
        
       Author : todsacerdoti
       Score  : 23 points
       Date   : 2020-06-18 06:45 UTC (1 days ago)
        
 (HTM) web link (darungrim.com)
 (TXT) w3m dump (darungrim.com)
        
       | xvilka wrote:
       | They mentioned WinDbg and OllyDbg but both are quirks of the past
       | (except WinDbg usage for kernel debugging), and there's a better
       | tool for this - x32dbg/x64dbg[1]. It's open-source, unlike WinDbg
       | and actively developed, unlike OllyDbg. Moreover, recently we
       | worked a lot on improving Windows support in radare2 [2] and
       | Cutter[3]. Most of our fixes should land in the upcoming 4.5.0[4]
       | release. This summer one of our GSoC students works on improving
       | reversible debugging [5] feature as well. And of course, both
       | integrated with Frida as well - see r2frida plugin[6].
       | 
       | [1] https://x64dbg.com/
       | 
       | [2] https://github.com/radareorg/radare2
       | 
       | [3] https://github.com/radareorg/cutter
       | 
       | [4] https://github.com/radareorg/radare2/milestone/51
       | 
       | [5] https://www.radare.org/gsoc/2020/ideas.html#title_10
       | 
       | [6] https://github.com/nowsecure/r2frida
        
         | xeeeeeeeeeeenu wrote:
         | Microsoft has recently modernized WinDbg[1]. Sadly, it's
         | available only via the Microsoft Store[2].
         | 
         | [1] - https://docs.microsoft.com/en-us/windows-
         | hardware/drivers/de...
         | 
         | [2] - https://www.microsoft.com/en-us/p/windbg-
         | preview/9pgjgd53tn8...
        
       ___________________________________________________________________
       (page generated 2020-06-19 23:00 UTC)