wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).
These patches simply add support for loading VMWare snapshots which are raw, linear, RAM dumps.
The change in the kdump parsers is simple, if the initial parsing fails, it opportunistically tries to load the file as a raw dump, else it continues into parsing different usual kdumps types.
The second part of the patch has to do with actually loading these where I had to relax a few warnings or errors, as there's no point in trying to enable a debugger on raw memory dumps.
To build the project with support for loading these VMWare dumps, there's a new build-release-vmware-support.bat script that enables the flags that relax the warnings.
I'll have a macOS/fuzzer target and an example workflow in a separate repository.
These patches simply add support for loading VMWare snapshots which are raw, linear, RAM dumps.
The change in the kdump parsers is simple, if the initial parsing fails, it opportunistically tries to load the file as a raw dump, else it continues into parsing different usual kdumps types.
The second part of the patch has to do with actually loading these where I had to relax a few warnings or errors, as there's no point in trying to enable a debugger on raw memory dumps.
To build the project with support for loading these VMWare dumps, there's a new
build-release-vmware-support.bat
script that enables the flags that relax the warnings.I'll have a macOS/fuzzer target and an example workflow in a separate repository.