k4lizen
k4lizen
    The highlighted line, and the line specified, is not actually the line in which the function is defined. I also suspect that the execution times may...
Decompile the binary attached with ghidra. [thewilderness.zip](https://github.com/NationalSecurityAgency/ghidra/files/15083527/thewilderness.zip) See ghidra output for function `run_code`:  See dogbolt comparison:  See gdb disassembly:  **Conclusion:** ghidra is cutting of because of the...
**Describe the bug** When the program is decompiled, an empty loop is shown, while the assembly shows that it is not empty. **To Reproduce** Steps to reproduce the behavior: 1....
Closes #2369 + implement `process.maps` which is a wrapper around `util.proc.memory_maps` + calls on self.pid, parses string address field and permissions field + `get_mapping` function which finds mappings given a...
For the `process.libc` property/function, the logic is [currently](https://github.com/Gallopsled/pwntools/blob/dev/pwnlib/tubes/process.py#L940): ```python def libc(): # for lib, address in self.libs().items(): if 'libc.so' in lib or 'libc-' in lib: e = ELF(lib) e.address =...
The same way there is a way to get the address of shared libraries: [process.libs()](https://docs.pwntools.com/en/stable/tubes/processes.html#pwnlib.tubes.process.process.libs), which is currently implemented by inspecting `/proc//maps` [as linked in the docs](https://github.com/Gallopsled/pwntools/blob/f046fdd93e/pwnlib/tubes/process.py#L826-L861), it should be...
### Description pwndbg hitting recursion limit while gdb works fine. CTF challenge zip: [the_wilderness.zip](https://github.com/pwndbg/pwndbg/files/15133514/the_wilderness.zip) Im using an older version of the sde than the challenge intended: https://www.intel.com/content/www/us/en/download/684897/784319/intel-software-development-emulator.html ### Steps to...
### Description Why is `__dso_handle` shown here?  ### Steps to reproduce [terminal.zip](https://github.com/pwndbg/pwndbg/files/14968910/terminal.zip) It's a binary from a ctf, so I don't have the source. It doesn't do anything elf-crafty...
Some examples: https://docs.pwntools.com/en/dev/elf/elf.html#pwnlib.elf.elf.ELF.library https://docs.pwntools.com/en/dev/elf/elf.html#pwnlib.elf.elf.ELF.linker https://docs.pwntools.com/en/dev/elf/elf.html#pwnlib.elf.elf.ELF.maps Click/hover the `[source]` button and see that they all link to: https://github.com/Gallopsled/pwntools/blob/fe560c9835/pwnlib/elf/elf.py This is true for both dev as well as stable. ### Expected For...
https://docs.pwntools.com/en/dev/elf/elf.html#pwnlib.elf.elf.ELF.maps https://docs.pwntools.com/en/dev/elf/elf.html#pwnlib.elf.elf.ELF.libs There might be more examples? This is true for both dev and stable. ### libs example In the docs: > address} for every library loaded for this ELF....