Did I find the right examples for you? yes no Crawl my project Python Jobs
All Samples(0) | Call(0) | Derive(0) | Import(0)
src/w/i/winappdbg-1.5/winappdbg/textio.py winappdbg(Download)
else: Protect = "??? " if mbiProtect & win32.PAGE_GUARD: Protect += "G" else:
src/w/i/winappdbg-1.5/winappdbg/sql.py winappdbg(Download)
else: access = "??? " if protect & win32.PAGE_GUARD: access += "G" else:
protect = win32.PAGE_NOACCESS if access[5] == "G": protect = protect | win32.PAGE_GUARD if access[6] == "N": protect = protect | win32.PAGE_NOCACHE
src/w/i/winappdbg-1.5/winappdbg/breakpoint.py winappdbg(Download)
dwSize = self.get_size() flNewProtect = aProcess.mquery(lpAddress).Protect flNewProtect = flNewProtect | win32.PAGE_GUARD aProcess.mprotect(lpAddress, dwSize, flNewProtect)
lpAddress = self.get_address() flNewProtect = aProcess.mquery(lpAddress).Protect flNewProtect = flNewProtect & (0xFFFFFFFF ^ win32.PAGE_GUARD) # DWORD aProcess.mprotect(lpAddress, self.get_size(), flNewProtect)
src/w/i/winappdbg-1.5/winappdbg/interactive.py winappdbg(Download)
def find_in_memory(self, query, process): for mbi in process.get_memory_map(): if mbi.State != win32.MEM_COMMIT or mbi.Protect & win32.PAGE_GUARD: continue address = mbi.BaseAddress
src/w/i/winappdbg-1.5/winappdbg/search.py winappdbg(Download)
# Do some namespace lookups of symbols we'll be using frequently. MEM_COMMIT = win32.MEM_COMMIT PAGE_GUARD = win32.PAGE_GUARD page = MemoryAddresses.pageSize read = pattern.read