wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).
Artificially insert Tenet memory read/write entries when the user does memory accesses in breakpoint callbacks or anywhere else.
If we don't do that, then Tenet "doesn't know" that a memory read (bp access wouldn't trigger) or a memory write (the memory state is 'wrong' until a memory read is done on that range to fetch the memory) happened.
Artificially insert Tenet memory read/write entries when the user does memory accesses in breakpoint callbacks or anywhere else.
If we don't do that, then Tenet "doesn't know" that a memory read (bp access wouldn't trigger) or a memory write (the memory state is 'wrong' until a memory read is done on that range to fetch the memory) happened.