Package winappdbg :: Package win32 :: Module peb_teb
[hide private]
[frames] | no frames]

Module peb_teb

source code

Debugging API wrappers in ctypes.


See Also: http://apps.sourceforge.net/trac/winappdbg/wiki/Win32APIWrappers

Classes [hide private]
  CLIENT_ID
  LDR_MODULE
  PEB_LDR_DATA
  PEB_FREE_BLOCK
  RTL_DRIVE_LETTER_CURDIR
  CURDIR
  RTL_USER_PROCESS_PARAMETERS
  RTL_CRITICAL_SECTION
  RTL_CRITICAL_SECTION_DEBUG
  PRTL_CRITICAL_SECTION
  PRTL_CRITICAL_SECTION_DEBUG
  PPEB_LDR_DATA
  PRTL_USER_PROCESS_PARAMETERS
  _PEB_NT
  _PEB_2000
  _PEB_XP
  _PEB_XP_64
  _PEB_2003
  _PEB_2003_64
  _PEB_2008
  _PEB_Vista
  _PEB_Vista_64
  _PEB_W7_Beta
This definition of the PEB structure is only valid for the beta versions of Windows 7.
  _PEB_W7
  _PEB_W7_64
  PEB
  Wx86ThreadState
  RTL_ACTIVATION_CONTEXT_STACK_FRAME
  ACTIVATION_CONTEXT_STACK
  PROCESSOR_NUMBER
  _NT_TIB_UNION
  NT_TIB
  PNTTIB
  EXCEPTION_REGISTRATION_RECORD
  GDI_TEB_BATCH
  TEB_ACTIVE_FRAME_CONTEXT
  PTEB_ACTIVE_FRAME_CONTEXT
  TEB_ACTIVE_FRAME
  PTEB_ACTIVE_FRAME
  _TEB_NT
  _TEB_2000
  _TEB_XP
  _TEB_XP_64
  _TEB_2003
  _TEB_2003_64
  _TEB_2008
  _TEB_Vista
  _TEB_Vista_64
  _TEB_W7
  _TEB_W7_64
  TEB
  PTEB
Variables [hide private]
  __revision__ = '$Id: peb_teb.py 462 2009-11-25 18:58:02Z qvasi...
  ImageUsesLargePages = 1
  IsProtectedProcess = 2
  IsLegacyProcess = 4
  IsImageDynamicallyRelocated = 8
  SkipPatchingUser32Forwarders = 16
  ProcessInJob = 1
  ProcessInitializing = 2
  ProcessUsingVEH = 4
  ProcessUsingVCH = 8
  ProcessUsingFTH = 16
  HeapTracingEnabled = 1
  CritSecTracingEnabled = 2
  FLG_VALID_BITS = 4194303
  FLG_STOP_ON_EXCEPTION = 1
  FLG_SHOW_LDR_SNAPS = 2
  FLG_DEBUG_INITIAL_COMMAND = 4
  FLG_STOP_ON_HUNG_GUI = 8
  FLG_HEAP_ENABLE_TAIL_CHECK = 16
  FLG_HEAP_ENABLE_FREE_CHECK = 32
  FLG_HEAP_VALIDATE_PARAMETERS = 64
  FLG_HEAP_VALIDATE_ALL = 128
  FLG_POOL_ENABLE_TAIL_CHECK = 256
  FLG_POOL_ENABLE_FREE_CHECK = 512
  FLG_POOL_ENABLE_TAGGING = 1024
  FLG_HEAP_ENABLE_TAGGING = 2048
  FLG_USER_STACK_TRACE_DB = 4096
  FLG_KERNEL_STACK_TRACE_DB = 8192
  FLG_MAINTAIN_OBJECT_TYPELIST = 16384
  FLG_HEAP_ENABLE_TAG_BY_DLL = 32768
  FLG_IGNORE_DEBUG_PRIV = 65536
  FLG_ENABLE_CSRDEBUG = 131072
  FLG_ENABLE_KDEBUG_SYMBOL_LOAD = 262144
  FLG_DISABLE_PAGE_KERNEL_STACKS = 524288
  FLG_HEAP_ENABLE_CALL_TRACING = 1048576
  FLG_HEAP_DISABLE_COALESCING = 2097152
  FLG_ENABLE_CLOSE_EXCEPTION = 4194304
  FLG_ENABLE_EXCEPTION_LOGGING = 8388608
  FLG_ENABLE_HANDLE_TYPE_TAGGING = 16777216
  FLG_HEAP_PAGE_ALLOCS = 33554432
  FLG_DEBUG_WINLOGON = 67108864
  FLG_ENABLE_DBGPRINT_BUFFERING = 134217728
  FLG_EARLY_CRITICAL_SECTION_EVT = 268435456
  FLG_DISABLE_DLL_VERIFICATION = 2147483648
  DbgSafeThunkCall = 1
  DbgInDebugPrint = 2
  DbgHasFiberData = 4
  DbgSkipThreadAttach = 8
  DbgWerInShipAssertCode = 16
  DbgRanProcessInit = 32
  DbgClonedThread = 64
  DbgSuppressDebugMsg = 128
  RtlDisableUserStackWalk = 256
  RtlExceptionAttached = 512
  RtlInitialThread = 1024
  __package__ = 'winappdbg.win32'
Variables Details [hide private]

__revision__

Value:
'$Id: peb_teb.py 462 2009-11-25 18:58:02Z qvasimodo $'