dnSpy是.NET程序集的逆向工程工具

网友投稿 1612 2022-10-14

dnSpy是.NET程序集的逆向工程工具

dnSpy是.NET程序集的逆向工程工具

dnSpy - Latest release - ❤️ Donate

dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available. Main features:

Debug .NET and Unity assembliesEdit .NET and Unity assembliesLight and dark themes

See below for more features

Building

git clone --recursive https://github.com/0xd4d/dnSpy.gitcd dnSpy# or dotnet build./build.ps1 -NoMsbuild

Debugger

Debug .NET Framework, .NET Core and Unity game assemblies, no source code requiredSet breakpoints and step into any assemblyLocals, watch, autos windowsVariables windows support saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window)Object IDsMultiple processes can be debugged at the same timeBreak on module loadTracepoints and conditional breakpointsExport/import breakpoints and tracepointsCall stack, threads, modules, processes windowsBreak on thrown exceptions (1st chance)Variables windows support evaluating C# / Visual Basic expressionsDynamic modules can be debugged (but not dynamic methods due to CLR limitations)Output window logs various debugging events, and it shows timestamps by default :)Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files.Public API, you can write an extension or use the C# Interactive window to control the debugger

Assembly Editor

All metadata can be editedEdit methods and classes in C# or Visual Basic with IntelliSense, no source code requiredAdd new methods, classes or members in C# or Visual BasicIL editor for low-level IL method body editingLow-level metadata tables can be edited. This uses the hex editor internally.

Hex Editor

Click on an address in the decompiled code to go to its IL code in the hex editorThe reverse of the above, press F12 in an IL body in the hex editor to go to the decompiled code or other high-level representation of the bits. It's great to find out which statement a patch modified.Highlights .NET metadata structures and PE structuresTooltips show more info about the selected .NET metadata / PE fieldGo to position, file, RVAGo to .NET metadata token, method body, #Blob / #Strings / #US heap offset or #GUID heap indexFollow references (Ctrl+F12)

Other

BAML decompilerBlue, light and dark themes (and a dark high contrast theme)BookmarksC# Interactive window can be used to script dnSpySearch assemblies for classes, methods, strings, etcAnalyze class and method usage, find callers, etcMultiple tabs and tab groupsReferences are highlighted, use Tab / Shift+Tab to move to the next referenceGo to the entry point and module initializer commandsGo to metadata token or metadata row commandsCode tooltips (C# and Visual Basic)Export to project

List of other open source libraries used by dnSpy

ILSpy decompiler engine (C# and Visual Basic decompilers)Roslyn (C# and Visual Basic compilers)dnlib (.NET metadata reader/writer which can also read obfuscated assemblies)VS MEF (Faster MEF equals faster startup)ClrMD (Access to lower level debugging info not provided by the CorDebug API)Iced (x86/x64 disassembler)

Translating dnSpy

Click here if you want to help with translating dnSpy to your native language.

Wiki

See the Wiki for build instructions and other documentation.

License

dnSpy is licensed under GPLv3.

Credits

版权声明:本文内容由网络用户投稿,版权归原作者所有,本站不拥有其著作权,亦不承担相应法律责任。如果您发现本站中有涉嫌抄袭或描述失实的内容,请联系我们jiasou666@gmail.com 处理,核实后本网站将在24小时内删除侵权内容。

上一篇:Jenkins初级应用之Invoke Phing targets插件配置
下一篇:远程文件传输程序,以知网为例
相关文章

 发表评论

暂时没有评论,来抢沙发吧~