Immunity Debugger
Immunity Debugger
Summary
Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer Win32 binaries. It builds on a solid user interface with function graphing, the industry's first heap analysis tool built specific for heap exploit creation, a large and well supported Python API for easy extensibility.
Python Scripting
Python scripts can be loaded and modified during runtime. The included Python interpreter will load any changes to your custom scripts on the fly. Sample scripts are included, as is full documentation on how to create your own. Immunity Debugger plugins are as follows:
Immunity Debugger's Python API includes many useful utilities and functions. Your scripts can be as integrated into the debugger as any native code. This means your code can create custom tables, graphs, and interfaces of all sorts that remain within the Immunity Debugger user experience. For example, when the Immunity SafeSEH script runs, it outputs the results into a table within the Immunity Debugger window.
Other scripts can ask for user input with dialogs and combo boxes:
Python commands can also be run directly from our Command Bar. Users can go back to previous entered commands, or just click in the dropdown menu and see all the recently used commands.
Python Hooks
Often you will want to run a Python script on certain program events, for example, when a breakpoint is hit or an exception is caused. Immunity Debugger hook support includes many debugger events, and more are added with every release.
Built In Graphing
Another Immunity Debugger feature is the capability of creating function graphs. Our Python VCG library will create a window inside Immunity Debugger at the click of a button to graph your selected function. No third party software is required.