Skip to content

v0.10

Latest
Compare
Choose a tag to compare
@github-actions github-actions released this 22 Jul 03:48
· 4 commits to master since this release
4d6a242

HyperDbg v0.10 is released!

If you’re enjoying HyperDbg, don’t forget to give a star 🌟 on GitHub!

Please visit Build & Install to configure the environment for running HyperDbg. Check out the Quick Start and Frequently Asked Questions (FAQs) to learn more. You can use the examples of using the debugger and the script engine to get started with HyperDbg.

Added

  • Support using assembly conditions and codes in all events (link)(link)
  • Added support for forwarding events to binary (DLL) modules (link)(link)(link)
  • Added the assembler command 'a' for virtual memory (link)
  • Added the assembler command '!a' for physical memory (link)
  • Providing a unified SDK API for reading memory in the VMI Mode and the Debugger Mode
  • Export SDK APIs for reading/writing into registers in the Debugger Mode
  • Export SDK API for writing memory in the VMI Mode and the Debugger Mode
  • Export SDK API for getting kernel base address
  • Export SDK API for connecting to the debugger and from debuggee in the Debugger Mode
  • Export SDK API for starting a new process
  • Add and export SDK API for unsetting message callback
  • Event commands are coming with more examples regarding scripts and assembly codes
  • Add message callback using shared memory
  • Add maximum execution limitation to the script IRs (#435) (link)

Changed

  • Fix clearing '!monitor' hooks on a different process or if the process is closed (#409) (link)
  • Fix triggering multiple '!monitor' hooks with different contexts (#415) (link)
  • Fix the problem of repeating commands once kHyperDbg is disconnected
  • Fix step-over hangs if the process terminates/excepts within call instruction (#406) (link)
  • Fix crash on editing invalid physical addresses (#424) (link)
  • Fix exporting VMM module load and install it in the SDK
  • Fix function interpretation issues and update the parser and the code execution (#435) (link)