0vercl0k / wtf

wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).
MIT License
1.47k stars 132 forks source link

Fix #210 #216

Open 0vercl0k opened 1 week ago

0vercl0k commented 1 week ago

Artificially insert Tenet memory read/write entries when the user does memory accesses in breakpoint callbacks or anywhere else.

If we don't do that, then Tenet "doesn't know" that a memory read (bp access wouldn't trigger) or a memory write (the memory state is 'wrong' until a memory read is done on that range to fetch the memory) happened.