[HN Gopher] Using Frida for Windows Reverse Engineering ___________________________________________________________________ Using Frida for Windows Reverse Engineering Author : todsacerdoti Score : 23 points Date : 2020-06-18 06:45 UTC (1 days ago) (HTM) web link (darungrim.com) (TXT) w3m dump (darungrim.com) | xvilka wrote: | They mentioned WinDbg and OllyDbg but both are quirks of the past | (except WinDbg usage for kernel debugging), and there's a better | tool for this - x32dbg/x64dbg[1]. It's open-source, unlike WinDbg | and actively developed, unlike OllyDbg. Moreover, recently we | worked a lot on improving Windows support in radare2 [2] and | Cutter[3]. Most of our fixes should land in the upcoming 4.5.0[4] | release. This summer one of our GSoC students works on improving | reversible debugging [5] feature as well. And of course, both | integrated with Frida as well - see r2frida plugin[6]. | | [1] https://x64dbg.com/ | | [2] https://github.com/radareorg/radare2 | | [3] https://github.com/radareorg/cutter | | [4] https://github.com/radareorg/radare2/milestone/51 | | [5] https://www.radare.org/gsoc/2020/ideas.html#title_10 | | [6] https://github.com/nowsecure/r2frida | xeeeeeeeeeeenu wrote: | Microsoft has recently modernized WinDbg[1]. Sadly, it's | available only via the Microsoft Store[2]. | | [1] - https://docs.microsoft.com/en-us/windows- | hardware/drivers/de... | | [2] - https://www.microsoft.com/en-us/p/windbg- | preview/9pgjgd53tn8... ___________________________________________________________________ (page generated 2020-06-19 23:00 UTC)