- Added Auto-Assemble.
- Software execute breakpoints now modify the page properties of the target process in order to ensure they can be set.
- Fixed an indirection bug with extern floats and doubles in the scripts.
- Added per-process breakpoint handlers (scripts).
- The help-file page regarding breakpoints has been broken into two parts to make it easier to read.
- The dialog prompting to attach the Debugger is no longer shown if adding the breakpoint is canceled.
- On_CloseProcess() script function now called before the process handle and ID are invalidated, and they are now passed to the function.
- Added an alternative way for searches to generate chunks for the scan. This allows searches to bypass anti-cheat devices.
- Added the EvaluateExpression and CastExpression functions to the script.
- Added the IsDebugging, AttachDebugger, DetachDebugger, DebugFile, AddBreakpoint, RemoveBreakpoint, EnterSingleStep, IsStepping, StopStepping, StepOnce, and StepOver functions to the script.
- Added the GetCurProcessPEproc function to the script.
- Added the AutoAssemble function to the script.
- The Go To dialog in the Disassembler now allows any valid expression for addresses and offsets.
- The Chunks tab of the Properties window now allows changing access rights.
- Added the On_DBG_* events to the script.
- Added the GetRemoteFuncAddress, InjectDll, FindModuleByAddress, FindModuleByRange, and FindModuleByName functions to the script.
http://www.memoryhacking.com/download.php
[培训]《安卓高级研修班(网课)》月薪三万计划,掌握调试、分析还原ollvm、vmp的方法,定制art虚拟机自动化脱壳的方法