这是一个免费、公开的在线PDB解析接口
交流群:878316370
接口地址(二选一)
接口限制:
——————————————————————————————————
这段介绍文本摘抄一下 @鬼才zxy 的文章(感谢!)。
这是一个用于在服务端解析PDB文件的工具,客户端只需要向服务端发送要查询程序文件的版本信息和所需的全局变量、函数名称、结构体属性名,即可得到对应的偏移量。

——————————————————————————————————
使用方式简介(和query-pdb项目不同)
客户端发送如下请求:
服务端响应如下:
如果需要结构体的完整定义,可以在structs类型查询时直接传空数组,接口将完整返回结构体所有成员及偏移+大小。(需要注意的是,采用的是无序返回,如果需要顺序需要自行按照offset来排列)
输入:
输出:
如果结构体不存在,则返回null
输入:
输出:
有时会遇到C++函数定义,比如
可以直接输入FindHotKey来匹配,接口会自动获取第一个匹配该函数名的结果来返回。
也可以输入完整的C++定义
来精确匹配,但是要注意不同版本间同一个函数的C++定义可能不同的。
服务端可能返回的状态码:
| 0 | 成功 | data 中包含查询结果 |
| 1 | 方法不允许 | 未使用 POST 方法 |
| 2 | 读取失败 | 无法读取请求体 |
| 3 | JSON 无效 | JSON 格式错误或无法解析 |
| 4 | 缺少必填字段 | pdb 和 guid 为必填项,或含无效字符 |
| 5 | 无查询项 | symbols/structs/enums 至少提供一个且不为空 |
| 6 | 超过查询上限 | 查询项总数超过 200 |
| 7 | PDB 不可用 | PDB 回源失败 |
| 8 | 解析失败 | PDB 文件损坏或格式不支持 |
http://msdl.saileaxh.com/parse
https://msdl.saileaxh.com/parse
http://msdl.saileaxh.com/parse
https://msdl.saileaxh.com/parse
{
"pdb": "ntdll.pdb",
"guid": "0AF9B92CB2856CFB0C54EC42CE8E3377",
"age": 1,
"symbols": [
"RtlInitUnicodeString",
"NtCreateFile",
"NtClose",
"totally_nonexistent_symbol"
],
"structs": {
"_PEB": [
"BeingDebugged",
"Ldr",
"ProcessParameters"
],
"_TEB": [
"ProcessEnvironmentBlock",
"ClientId"
],
"_KTHREAD": [
"Running",
"Alerted",
"KernelStackResident"
]
},
"enums": {
"_FILE_INFORMATION_CLASS": [
"FileDirectoryInformation",
"FileBasicInformation"
],
"_EVENT_TYPE": [
"NotificationEvent",
"SynchronizationEvent"
]
}
}
{
"pdb": "ntdll.pdb",
"guid": "0AF9B92CB2856CFB0C54EC42CE8E3377",
"age": 1,
"symbols": [
"RtlInitUnicodeString",
"NtCreateFile",
"NtClose",
"totally_nonexistent_symbol"
],
"structs": {
"_PEB": [
"BeingDebugged",
"Ldr",
"ProcessParameters"
],
"_TEB": [
"ProcessEnvironmentBlock",
"ClientId"
],
"_KTHREAD": [
"Running",
"Alerted",
"KernelStackResident"
]
},
"enums": {
"_FILE_INFORMATION_CLASS": [
"FileDirectoryInformation",
"FileBasicInformation"
],
"_EVENT_TYPE": [
"NotificationEvent",
"SynchronizationEvent"
]
}
}
{
"status": 0,
"message": "ok",
"data": {
"symbols": {
"NtClose": 644800,
"NtCreateFile": 647040,
"RtlInitUnicodeString": 244288,
"totally_nonexistent_symbol": -1
},
"structs": {
"_KTHREAD": {
"Alerted": {
"offset": 114,
"length": 2,
"bitfield_offset": 0,
"bitfield_length": 0
},
"KernelStackResident": {
"offset": 120,
"length": 1,
"bitfield_offset": 17,
"bitfield_length": 1
},
"Running": {
"offset": 113,
"length": 1,
"bitfield_offset": 0,
"bitfield_length": 0
}
},
"_PEB": {
"BeingDebugged": {
"offset": 2,
"length": 1,
"bitfield_offset": 0,
"bitfield_length": 0
},
"Ldr": {
"offset": 24,
"length": 8,
"bitfield_offset": 0,
"bitfield_length": 0
},
"ProcessParameters": {
"offset": 32,
"length": 8,
"bitfield_offset": 0,
"bitfield_length": 0
}
},
"_TEB": {
"ClientId": {
"offset": 64,
"length": 0,
"bitfield_offset": 0,
"bitfield_length": 0
},
"ProcessEnvironmentBlock": {
"offset": 96,
"length": 8,
"bitfield_offset": 0,
"bitfield_length": 0
}
}
},
"enums": {
"_EVENT_TYPE": {
"NotificationEvent": 0,
"SynchronizationEvent": 1
},
"_FILE_INFORMATION_CLASS": {
"FileBasicInformation": 4,
"FileDirectoryInformation": 1
}
}
}
}
{
"status": 0,
"message": "ok",
"data": {
"symbols": {
"NtClose": 644800,
"NtCreateFile": 647040,
"RtlInitUnicodeString": 244288,
"totally_nonexistent_symbol": -1
},
"structs": {
"_KTHREAD": {
"Alerted": {
"offset": 114,
"length": 2,
"bitfield_offset": 0,
"bitfield_length": 0
},
"KernelStackResident": {
"offset": 120,
"length": 1,
"bitfield_offset": 17,
"bitfield_length": 1
},
"Running": {
"offset": 113,
"length": 1,
"bitfield_offset": 0,
"bitfield_length": 0
}
},
"_PEB": {
"BeingDebugged": {
"offset": 2,
"length": 1,
"bitfield_offset": 0,
"bitfield_length": 0
},
"Ldr": {
"offset": 24,
"length": 8,
"bitfield_offset": 0,
[培训]Windows内核深度攻防:从Hook技术到Rootkit实战!
最后于 13小时前
被Saileaxh编辑
,原因: