Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

https://github.com/marakew/syser

syser debugger x32/x64 ring3 with source level debugging/watch view/struct view
https://github.com/marakew/syser

debugger reverse-engineering struct-viewer windows x64 x86-64

Last synced: about 1 month ago
JSON representation

syser debugger x32/x64 ring3 with source level debugging/watch view/struct view

Lists

README

        

the original [syser debugger](https://github.com/yanfengwu-syser/syserdebugger) now is opensource

reverse engineering old syser win32 debugger

improved handle x64 arch and fix some bugs

my syser IDA reverse engineering [database idb](https://github.com/marakew/rep/tree/master/syser)

you able to see about my reverse engineering skills

struct viewer

note: pdb2sds.exe .pdb .sds must be same arch!

for source level debugging don't convert .exe to .sds

syser debugger will automatic detect .pdb for .exe

pdb2sds.exe while convert doest include source level debug info

only structs and variables

convert any .pdb or .exe by util pdb2sds.exe

load .sds file from syser menu

Menu "File"->"Load Symbol File"

check from console by command

>sdsmod

File BP(s) Size(k) CheckSum TimeStamp ModuleName

0 0k 00000001 00000001 testx64.pdb

1 Module(s)

start debug .exe

open popup menu on data window by right mouse button

choose a struct by select it

choose "Attach type to Addr"

choose "Lock Type"

enter at "Address" address of struct

[sources](source)

If you want to thank me
```
BTC 3HdQ9tLRoZ1uRGV6rfoDoUhF75DqzJa4UM
```