-
-
Notifications
You must be signed in to change notification settings - Fork 2.4k
Frequently Asked Questions
This section contains questions frequently encountered about x64dbg. Feel free to add your own answers to not-so-obvious things.
Q: I want to learn reversing, and I know how to program. Where do I start?
A: Here are a bunch of links that can help you get started:
- https://crackmes.cf
- https://www.amazon.com/Practical-Reverse-Engineering-Reversing-Obfuscation/dp/1118787315
- https://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817/
- https://beginners.re/
- https://legend.octopuslabs.io/sample-page.html
- https://reversewithme.blogspot.com/2012/10/why-lena151-tutorials-wont-teach-you.html
- https://reverseengineering.stackexchange.com/questions/6801/general-consensus-on-lenas-tutorials
- https://godbolt.org
- https://lifeinhex.com/how-to-learn-reverse-engineering/
- https://gynvael.coldwind.pl/?id=664
- Reverse engineering Discord
- https://gist.github.com/navneetmuffin/ff678b1fda17e6188aa0462a99626121
- OALabs Discord
Feel free to add a resource you can recommend if you think you know a good one.
Q: Why isn't process X shown in the attach dialog?
A: If x64dbg cannot get a handle to a process it will not show it in the attach dialog. Go to setting and make sure the Enable Debug Privilege
option is checked in the Engine
tab. Also make sure you are running x64dbg as an administrator. If your process is still not shown and you are running Windows 8.1 or later, make sure the kernel is not protecting it. This protection can be removed by a kernel driver such as PPLKiller.
Q: Help, I cannot change the command line of a target program!
Q: Help, how do I pass arguments to the program I want to debug?
A: Use the File -> Change Command Line
option:
Q: Building x64dbg is complicated, help me out!
A: A guide to building x64dbg is available here. If you follow the steps correctly there should be no issues compiling x64dbg.
Q: How do I contribute?
A: You can check out this dedicated page for more information on how to contribute.
Q: How do the commands mentioned in the help work?
A: Basically the commands work like assembler (with comma separated arguments). mov eax, 0x1234
is a valid command. You can enter them in the command bar (not in the command line of x64dbg):
Q: Does x64dbg make entries in registry or create files in system directories? Or it's portable (like OllyDbg)?
A: Unlike OllyDbg, x64dbg is fully portable (all paths are relative to the x64dbg executables and in Olly you have absolute plugin and UDD paths). This means you can copy your x64dbg.ini anywhere without having to change anything.
Per default x64dbg will not create any registry entries. However if you use it as a JIT debugger it will change that key. Same applies for x96dbg.exe (that creates a Debug with x64dbg
entry in file explorer context menu).
Q: How do I remove the Debug with x64dbg
entries from my context menu?
A: Download & execute this regfile (remember to Save as...
).
Q: How can I automatically attach x64dbg to a process on startup?
A: This can be achieved with the Image File Execution Options registry key. You can use the GFlags utility to do this from a graphical user interface.
Q: How can I use PLMDebug with x64dbg?
A: Use plmdebug /enableDebug <Package> "C:\path\to\x64dbg\release\x96dbg.exe"
(you can also use x32dbg.exe
or x64dbg.exe
but with x96dbg.exe
it will automatically choose the correct architecture). See issue #1698 for more information.
Q: Why are not all my patches being applied (0/X patch(es) applied!
message box)?
A: Probably you are trying to patch in a section that has no representation on disk (SizeOfRawData
is zero or you are patching after the end of a section). You can confirm this by checking if the address you want to patch has a file offset:
Q: How can I use debug symbols in the DWARF format (MinGW -g
option) with x64dbg?
A: There is no direct support for DWARF symbols in x64dbg, however you can use cv2pdb to convert the DWARF symbols to PDB.
Q: How can inspect/debug .NET/dotnet/C#/Unity programs?
A: Use dnSpy (no longer developed, try dnSpyEx).
Q: How can I debug services?
A: Debugging services isn't properly supported, but you can check #2411.
Q: On Windows 7 I get DLL does not have a valid signature
, how to fix this?
A: You need the latest root certificate store update Windows6.1-KB3004394-v2-x86.msu for signature validation. Alternatively you can replace x64dbg.exe
with x64dbg-unsigned.exe
to disable signature verification completely.
Note: Due to continued vandalism it is no longer possible to edit the wiki directly. Instead you can suggest an edit in the x64dbg/wiki repository.