|
HyperDbg Debugger
|
Implementation of debugger VMCALLs. More...
Go to the source code of this file.
Functions | |
| VOID | DebuggerEventEnableEferOnAllProcessors () |
| routines for !syscall command (enable syscall hook) | |
| VOID | DebuggerEventDisableEferOnAllProcessors () |
| routines for !syscall command (disable syscall hook) | |
| VOID | DebuggerEventEnableMovToCr3ExitingOnAllProcessors () |
| routines for debugging threads (enable mov-to-cr3 exiting) | |
| VOID | DebuggerEventDisableMovToCr3ExitingOnAllProcessors () |
| routines for debugging threads (disable mov-to-cr3 exiting) | |
| BOOLEAN | DebuggerEventEnableMonitorReadWriteExec (EPT_HOOKS_ADDRESS_DETAILS_FOR_MEMORY_MONITOR *HookingDetails, UINT32 ProcessId, BOOLEAN ApplyDirectlyFromVmxRoot) |
| Apply monitor ept hook events for address. | |
| BOOLEAN | DebuggerCheckProcessOrThreadChange (_In_ UINT32 CoreId) |
| Handle process or thread switches. | |
Implementation of debugger VMCALLs.
Headers of Debugger events (triggers and enable events)
Handle process or thread switches.
| CoreId |
| VOID DebuggerEventDisableEferOnAllProcessors | ( | ) |
routines for !syscall command (disable syscall hook)
| VOID DebuggerEventDisableMovToCr3ExitingOnAllProcessors | ( | ) |
routines for debugging threads (disable mov-to-cr3 exiting)
| VOID DebuggerEventEnableEferOnAllProcessors | ( | ) |
routines for !syscall command (enable syscall hook)
| BOOLEAN DebuggerEventEnableMonitorReadWriteExec | ( | EPT_HOOKS_ADDRESS_DETAILS_FOR_MEMORY_MONITOR * | HookingDetails, |
| UINT32 | ProcessId, | ||
| BOOLEAN | ApplyDirectlyFromVmxRoot ) |
Apply monitor ept hook events for address.
| HookingDetails | |
| ProcessId | |
| ApplyDirectlyFromVmxRoot |
| VOID DebuggerEventEnableMovToCr3ExitingOnAllProcessors | ( | ) |
routines for debugging threads (enable mov-to-cr3 exiting)