<?xml version="1.0"?>
<rss version="2.0">
    <channel>
        <title>OpenRCE: Blog</title>
        <link>http://www.openrce.org/rss/feeds/blog</link>
        <description>OpenRCE: The Open Reverse Code Engineering Community</description>
                <item>
            <title>New version of Ollydbg!</title>
                            <pubDate>Fri, 24 Aug 2012 10:48:48 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/2373/New_version_of_Ollydbg!</link>
                                        <author>inwk &lt;email-suppressed@example.com&gt;</author>
                                                    <description>The new version of Olly is &lt;b&gt;OllyDbg 2.01 beta 2&lt;/b&gt;, more info &lt;a href=&quot;http://www.ollydbg.de/version2.html&quot;&gt;here&lt;/a&gt;.</description>
                    </item>
                <item>
            <title>Immunity debugger - default PyCommands</title>
                            <pubDate>Wed, 15 Aug 2012 08:34:01 -0500</pubDate>
                                        <link>https://www.openrce.org/blog/view/2324/Immunity_debugger_-_default_PyCommands</link>
                                        <author>inwk &lt;email-suppressed@example.com&gt;</author>
                                                    <description>This blog entry is just quick note. I am new user of immdbg and it's nice to have short list of commands :)&lt;br /&gt;
&lt;br /&gt;
Activex:&lt;br /&gt;
- activex - This is script that will resolve exposed COM functions to their relative address.&lt;br /&gt;
&lt;br /&gt;
Logging:&lt;br /&gt;
- apitrace - Hooks all intermodular function calls and logs them&lt;br /&gt;
- sqlhooker - logs SQL queries&lt;br /&gt;
- getevent - Get a log of current debugevent&lt;br /&gt;
&lt;br /&gt;
Heap:&lt;br /&gt;
- chunkanalyzehook - Analize a Specific Chunk at a specific moment. Gets address as a value of EIP and expression to calculate the chunk address&lt;br /&gt;
- funsniff - Analize the heap pattern of a executed function&lt;br /&gt;
- heap - Immunity Heap Dump and analyzing tool&lt;br /&gt;
- hippie - Heap logging function&lt;br /&gt;
- hookheap - Hook on RtlAllocateHeap/RtlFreeHeap and display information&lt;br /&gt;
- horse - Low Fragmentation Heap Viewer&lt;br /&gt;
- lookaside - Shows the Lookaside of the Heap structure&lt;br /&gt;
&lt;br /&gt;
Exploiting:&lt;br /&gt;
- acrocache - Dumps Acrobat Reader Cache state&lt;br /&gt;
- duality - Looks for mapped address that can be 'transformed' into opcodes&lt;br /&gt;
- findantidep - Find address to bypass software DEP&lt;br /&gt;
- safeseh - Looks for exception handlers registered with SafeSEH&lt;br /&gt;
- vcthook - This hook is used to check if the arguments of VariantChangeType are pointers to the same object. There might be vulnerabilities in code that call this function in such a manner.&lt;br /&gt;
&lt;br /&gt;
Searching and comparing:&lt;br /&gt;
- cmpmem - Compare memory with a file&lt;br /&gt;
- mark - Static Analysis: Mark the tiny ones. Search and mark given function.&lt;br /&gt;
-search - simple script that lets you quickie search for regexp&lt;br /&gt;
- searchcode - Search code in memory&lt;br /&gt;
- searchcrypt - Search a defined memory range looking for cryptographic routines&lt;br /&gt;
- searchheap - Search the heap for specific chunks&lt;br /&gt;
- searchspray - Script to search all occurences of a string in memory and display them on a table&lt;br /&gt;
- shellcodediff - Check for badchars&lt;br /&gt;
&lt;br /&gt;
Analyzing:&lt;br /&gt;
- bpxep - Finds entry point...&lt;br /&gt;
- dependencies - Find a exported function on the loaded dll&lt;br /&gt;
- finddatatype - Attempts to find the type of the data spanning&lt;br /&gt;
- findloop - Find natural loops given a function start address&lt;br /&gt;
- findpacker - Find a Packer/Cryptor on a Module&lt;br /&gt;
- getrpc - Get the RPC information of a loaded dll&lt;br /&gt;
- hookndr - Hooks the NDR unmarshalling routines and prints them out so you can see which ones worked&lt;br /&gt;
- recognize - Function Recognizing using heuristic patterns&lt;br /&gt;
- scanpe - Detect a Packer/Cryptor of Main Module, also scan just EntryPoint. Calculates the entropy of a chunk of data.&lt;br /&gt;
- stackvars - set comments around the code to follow stack variables size and content&lt;br /&gt;
- syscall - discover system calls&lt;br /&gt;
- treedll - Creates imported dll tree&lt;br /&gt;
&lt;br /&gt;
Network:&lt;br /&gt;
- hookssl - Creates a table that displays packets received on the network&lt;br /&gt;
- mike - Attempts to automate tracing the lifecycle of a network packet's contents.&lt;br /&gt;
- packets - Creates a table that displays packets received on the network&lt;br /&gt;
&lt;br /&gt;
Misc:&lt;br /&gt;
- gflags - Global flags management tools&lt;br /&gt;
- hidedebug - Patches lots of anti-debug protection&lt;br /&gt;
- list - List all pycommands in log window&lt;br /&gt;
- modptr - Patch all Function Pointers and detect when they triggered&lt;br /&gt;
- nohooks - Clean all hooks from memory&lt;br /&gt;
- openfile - Opens a File&lt;br /&gt;
- pyexec - Non interactive python shell [immlib already imported]&lt;br /&gt;
- template - Immunity PyCommand Template&lt;br /&gt;
- traceargs - Find User supplied arguments into a given function&lt;br /&gt;
- usage - Return the usage information for a python command&lt;br /&gt;
&lt;br /&gt;
It's all. Any mistakes?</description>
                    </item>
            </channel>
</rss>
