{"id":13667866,"url":"https://github.com/udbg/udbg","last_synced_at":"2025-04-26T18:30:40.658Z","repository":{"id":37777180,"uuid":"422919082","full_name":"udbg/udbg","owner":"udbg","description":"Cross-platform library for binary debugging and memory hacking written in Rust","archived":false,"fork":false,"pushed_at":"2024-07-28T17:35:06.000Z","size":846,"stargazers_count":102,"open_issues_count":0,"forks_count":13,"subscribers_count":5,"default_branch":"master","last_synced_at":"2025-04-17T15:21:42.427Z","etag":null,"topics":["cross-platform","debug","debugger","debugging","memory-hacking","reverse-engineering","rust","utility-library"],"latest_commit_sha":null,"homepage":"","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/udbg.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2021-10-30T15:29:41.000Z","updated_at":"2025-04-02T03:51:49.000Z","dependencies_parsed_at":"2024-08-02T07:12:03.084Z","dependency_job_id":null,"html_url":"https://github.com/udbg/udbg","commit_stats":{"total_commits":86,"total_committers":1,"mean_commits":86.0,"dds":0.0,"last_synced_commit":"8e62b96d099f86dc285f8cf8184ded5dc3220d1c"},"previous_names":["udbg/udbg-base"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/udbg%2Fudbg","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/udbg%2Fudbg/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/udbg%2Fudbg/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/udbg%2Fudbg/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/udbg","download_url":"https://codeload.github.com/udbg/udbg/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":251035120,"owners_count":21526307,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cross-platform","debug","debugger","debugging","memory-hacking","reverse-engineering","rust","utility-library"],"created_at":"2024-08-02T07:00:52.538Z","updated_at":"2025-04-26T18:30:39.581Z","avatar_url":"https://github.com/udbg.png","language":"Rust","readme":"\n# udbg\n\n[![crates.io](https://img.shields.io/crates/v/udbg.svg)](https://crates.io/crates/udbg)\n[![docs.rs](https://docs.rs/udbg/badge.svg)](https://docs.rs/udbg)\n\nCross-platform library for binary debugging and memory hacking written in Rust.\n\n- 👍 Cross-platform: udbg wraps the details of different interfaces on different platform, and provides uniform interfaces\n- 👍 Multiple-target: you can control multiple debug target in most cases\n- 👍 Non-invasive: you can only view the information of target, instead of attaching to it\n- 👍 Various target types: In addition to process, target can be a [`minidump`](struct@minidump::MiniDumpTarget), a [`PE file`](struct@pe::PETarget), even be the OS-Kernel space with extra extension.\n\n## API Overview\n\nThere are two main kinds of interfaces in udbg, target information and debugging interfaces.\n\nInterfaces of target information, which abstracted as the [`UDbgTarget`](trait@target::UDbgTarget) trait, represents an observable debugging target, it is an [`active process`](struct@os::ProcessTarget) in most cases, also it can be a [`minidump`](struct@minidump::MiniDumpTarget), a [`PE file`](struct@pe::PETarget), even be the OS-Kernel space with extra extension.\n\n[`UDbgTarget`](trait@target::UDbgTarget) contains these functions, [`memory operation`](trait@memory::TargetMemory) (read/write/enumeration), [`module`](trait@symbol::UDbgModule) enumeration, [`thread`](trait@target::UDbgThread) enumeration, [`handle/FDs`](struct@shell::HandleInfo) enumeration, etc. Based on these functions, we can implement some utililties over the different types of target, such as **[module dump](https://github.com/glmcdona/Process-Dump)**, **memory search**, **hook scanning**, **malicious code scanning**, etc.\n\nDebugging interfaces, which abstracted as the [`UDbgEngine`](trait@target::UDbgEngine) trait, mainly provides the ability of process control. There is a [`default implementation`](struct@os::DefaultEngine), typically it wraps the [Debugging Functions](https://docs.microsoft.com/en-us/windows/win32/debug/debugging-functions) on Windows, and wraps the [ptrace](https://man7.org/linux/man-pages/man2/ptrace.2.html) interfaces on Linux.\n\nMost of above interfaces were designed to be dynamic objects, which is for script-binding friendly, and udbg provides [`lua bindings`](mod@lua) defaultly.\n\nCurrent status of target information interfaces\n\n| Platform/Target | Memory operation | Memory List | Thread | Module/Symbol | Handle/FD List |\n| --------------- | ---------------- | ----------- | ------ | ------------- | -------------- |\n| Windows Process | ✔️               | ✔️          | ✔️     | ✔️            | ✔️             |\n| Linux Process   | ✔️               | ✔️          | ✔️     | ✔️            | ✔️             |\n| MacOs Process   | ✔️               | ✔️          | ✔️     | ✔️            | ✔️             |\n| Minidump        | ✔️ (readonly)    | ✔️          | ✔️     | ✔️            | 🚧              |\n| PE File         | ✔️ (readonly)    | ✔️          | -      | -             | -              |\n\nCurrent status of debugging interfaces\n\n| Platform/Target  | Debug Symbol | Breakpoint | Watchpoint(HWBP) | Multiple Target |\n| ---------------- | ------------ | ---------- | ---------------- | --------------- |\n| Windows(x86/x64) | ✔️ (pdb)     | ✔️         | ✔️               | ✔️              |\n| Windows(aarch64) | ✔️ (pdb)     | ✔️         | ✔️               | ✔️              |\n| Linux(x86_64)    | ✔️ (elf)     | ✔️         | ✔️               | ✔️              |\n| Linux(aarch64)   | ✔️ (elf)     | ✔️         | ✔️               | ✔️              |\n\n\u003c!-- ### Wrapper of functions in ntdll for windows --\u003e\n\n\u003c!-- ### String utilities --\u003e\n\n## Examples\n\n- Cross-platform interfaces to get target information, see `src/test.rs` `fn target`\n- Write a basic debugger, see `src/test.rs` `fn test_debug`\n\u003c!-- - Read or write target memory, even any struct --\u003e\n\u003c!-- tracing multiple target, and its child --\u003e","funding_links":[],"categories":["库"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fudbg%2Fudbg","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fudbg%2Fudbg","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fudbg%2Fudbg/lists"}