==== mona
Fork of Corelan’s mona.py for x64dbg. mona is a Windows exploit development swiss army knife. It supports ROP techniques, SEH, cyclic patterns, etc.
To see all commands and usage details, run mona with the help
command.
First, get x64dbgpy for x64dbg Python support. You can grab a release here. Drop the contents of the plugins
directory into your x64dbg plugins
folder.
Then, put mona.py
into the plugins/x64dbgpy
folder. You will also need the pykd.py
and x64dbgpylib.py
files from https://github.com/x64dbg/x64dbgpylib. Finally, put the clean_mona.py
script in x64dbgpy/x64dbgpy/autorun
.
Now, run mona commands at the x64dbg Python command line with mona.mona(“command”)
.
Simply drop mona.py into the 'PyCommands' folder (inside the Immunity Debugger application folder).
See https://github.com/corelan/windbglib
modules
— Show all loaded modules and their properties (ASLR, Rebase, DEP, etc.)heap
— Show heap related informationseh
— Find pointers to assist with SEH overwrite exploitsjmp
— Find pointers that will allow you to jump to a registerrop
— Finds gadgets that can be used in a ROP exploit and do ROP magic with themjop
— Finds gadgets that can be used in a JOP exploitpattern_offset
— Find location of 4 bytes in a cyclic pattern