Want to Join Us ?

you'll be able to discuss, share and send private messages.

NEW Api Break for x64dbg by 0ffffffffh

Discussion in 'x64dbg Plugin' started by storm shadow, Jan 29, 2017.

Share This Page

  1. storm shadow

    Techbliss Owner Admin Ida Pro Expert Developer

    Api Break for x64dbg

    Api Break is a x64dbg plugin which is aimed to set breakpoints Win32/64 API calls easly.
    [​IMG]
    Features

    • API function entry breakpoint (AEB)
    • Breakpoint at API callers (BAC)
    • Auto-populating modules and their API functions used by the process.
    API Function Entry Breakpoint (AEB)

    It can be useful when the code does obfuscated or indirect api calls or something similar conditions. This mode is automatically (naturally) handles all API calls for the entire module. Also, this mode gives an option to jump automatically to the API caller when the API entry breakpoint hit. It exposes the original caller using single step callstack backtracing.
    Breakpoint at API callers (BAC)

    In technically, this mode is much more flexible and customizable. It does scan dynamically for API calls in specified module or address range. For now, it scans only process's code range. But other features are planned for future development.
    If you have any idea, let me know what ideas you have about it.
    In-Development features

    • Dynamically loaded API detection which is made by using GetProcAddress (About 45% implemented)
    Planning features

    • User specified code range scan for BAC
    • User specified module scan for BAC
    • User option to listing all linked modules and APIs of process regardless of IAT.
    download latest
    https://github.com/0ffffffffh/Api-Break-for-x64dbg/releases
     
    m4n0w4r, samoray and Rip Cord like this.
  2. samoray

    Active Member

    Last edited: Feb 9, 2017
    roocoon, m4n0w4r and Rip Cord like this.
Top