| HyperDbg Debugger
    | 
Implementation of debugger VMCALLs. More...
Go to the source code of this file.
| Functions | |
| VOID | DebuggerEventEnableEferOnAllProcessors () | 
| routines for !syscall command (enable syscall hook) | |
| VOID | DebuggerEventDisableEferOnAllProcessors () | 
| routines for !syscall command (disable syscall hook) | |
| VOID | DebuggerEventEnableMovToCr3ExitingOnAllProcessors () | 
| routines for debugging threads (enable mov-to-cr3 exiting) | |
| VOID | DebuggerEventDisableMovToCr3ExitingOnAllProcessors () | 
| routines for debugging threads (disable mov-to-cr3 exiting) | |
| BOOLEAN | DebuggerEventEnableMonitorReadWriteExec (EPT_HOOKS_ADDRESS_DETAILS_FOR_MEMORY_MONITOR *HookingDetails, UINT32 ProcessId, BOOLEAN ApplyDirectlyFromVmxRoot) | 
| Apply monitor ept hook events for address. | |
| BOOLEAN | DebuggerCheckProcessOrThreadChange (_In_ UINT32 CoreId) | 
| Handle process or thread switches. | |
Implementation of debugger VMCALLs.
Headers of Debugger events (triggers and enable events)
Handle process or thread switches.
| CoreId | 
| VOID DebuggerEventDisableEferOnAllProcessors | ( | ) | 
routines for !syscall command (disable syscall hook)
| VOID DebuggerEventDisableMovToCr3ExitingOnAllProcessors | ( | ) | 
routines for debugging threads (disable mov-to-cr3 exiting)
| VOID DebuggerEventEnableEferOnAllProcessors | ( | ) | 
routines for !syscall command (enable syscall hook)
| BOOLEAN DebuggerEventEnableMonitorReadWriteExec | ( | EPT_HOOKS_ADDRESS_DETAILS_FOR_MEMORY_MONITOR * | HookingDetails, | 
| UINT32 | ProcessId, | ||
| BOOLEAN | ApplyDirectlyFromVmxRoot ) | 
Apply monitor ept hook events for address.
| HookingDetails | |
| ProcessId | |
| ApplyDirectlyFromVmxRoot | 
| VOID DebuggerEventEnableMovToCr3ExitingOnAllProcessors | ( | ) | 
routines for debugging threads (enable mov-to-cr3 exiting)