dnSpy 朱雀 2023-06-01 05:32 202阅读 0赞 [https://github.com/0xd4d/dnSpy/releases][https_github.com_0xd4d_dnSpy_releases] 如果客户环境出了问题,而又无法快速定位问题,可以借助[dnSpy][]进行反编译调试跟踪。 dnSpy is a debugger and .NET assembly editor. You can use it to edit and debug assemblies even if you don't have any source code available. Want to say thanks? Click the star at the top of the page. Or fork dnSpy and send a PR! The following pictures show dnSpy in action. It shows dnSpy editing and debugging a .NET EXE file, not source code. [![debug-animated][]][debug-animated 1] [![edit-code-animated][]][edit-code-animated 1] # Features (see below for more detail) # * Debug .NET Framework, .NET Core and Unity game assemblies, no source code required * Edit assemblies in C\# or Visual Basic or IL, and edit all metadata * Light and dark themes * Extensible, write your own extension * High DPI support (per-monitor DPI aware) * And much more, see below dnSpy uses the ILSpy decompiler engine and the Roslyn (C\# / Visual Basic) compiler and many other open source libraries, see below for more info. # Binaries # [Latest release][https_github.com_0xd4d_dnSpy_releases] Latest build: [![Build status][]][Build status 1] Or build it from source, see the [Wiki][]. # Debugger # * Debug .NET Framework, .NET Core and Unity game assemblies, no source code required * Set breakpoints and step into any assembly * Locals, watch, autos windows * Variables windows supports saving variables (eg. decrypted byte arrays) to disk or view them in the hex editor (memory window) * Object IDs * Multiple processes can be debugged at the same time * Break on module load * Tracepoints and conditional breakpoints * Export/import breakpoints and tracepoints * Call stack, threads, modules, processes windows * Break on thrown exceptions (1st chance) * Variables windows support evaluating C\# / Visual Basic expressions * Dynamic modules can be debugged (but not dynamic methods due to CLR limitations) * Output window logs various debugging events, and it shows timestamps by default :) * Assemblies that decrypt themselves at runtime can be debugged, dnSpy will use the in-memory image. You can also force dnSpy to always use in-memory images instead of disk files. * Public API, you can write an extension or use the C\# Interactive window to control the debugger # Assembly Editor # * All metadata can be edited * Edit methods and classes in C\# or Visual Basic with IntelliSense, no source code required * Add new methods, classes or members in C\# or Visual Basic * IL editor for low level IL method body editing * Low level metadata tables can be edited. This uses the hex editor internally. # Hex Editor # * Click on an address in the decompiled code to go to its IL code in the hex editor * Reverse of above, press F12 in an IL body in the hex editor to go to the decompiled code or other high level representation of the bits. It's great to find out which statement a patch modified. * Highlights .NET metadata structures and PE structures * Tooltips shows more info about the selected .NET metadata / PE field * Go to position, file, RVA * Go to .NET metadata token, method body, \#Blob / \#Strings / \#US heap offset or \#GUID heap index * Follow references (Ctrl+F12) # Other # * BAML decompiler * Blue, light and dark themes (and a dark high contrast theme) * Bookmarks * C\# Interactive window can be used to script dnSpy * Search assemblies for classes, methods, strings etc * Analyze class and method usage, find callers etc * Multiple tabs and tab groups * References are highlighted, use Tab / Shift+Tab to move to next reference * Go to entry point and module initializer commands * Go to metadata token or metadata row commands * Code tooltips (C\# and Visual Basic) * Export to project # List of other open source libraries used by dnSpy # * ILSpy decompiler engine (C\# and Visual Basic decompilers) * Roslyn (C\# and Visual Basic compilers) * dnlib (.NET metadata reader/writer which can also read obfuscated assemblies) * VS MEF (Faster MEF equals faster startup) * ClrMD (Access to lower level debugging info not provided by the CorDebug API) # Translating dnSpy # [Click here][] if you want to help with translating dnSpy to your native language. # Wiki # See the [Wiki][Wiki 1] for build instructions and other documentation. # License # dnSpy is licensed under [GPLv3][]. # [Credits][] # 转载于:https://www.cnblogs.com/Jeely/p/11350589.html [https_github.com_0xd4d_dnSpy_releases]: https://github.com/0xd4d/dnSpy/releases [dnSpy]: https://github.com/0xd4d/dnSpy [debug-animated]: https://github.com/0xd4d/dnSpy/raw/master/images/debug-animated.gif [debug-animated 1]: https://github.com/0xd4d/dnSpy/blob/master/images/debug-animated.gif [edit-code-animated]: https://github.com/0xd4d/dnSpy/raw/master/images/edit-code-animated.gif [edit-code-animated 1]: https://github.com/0xd4d/dnSpy/blob/master/images/edit-code-animated.gif [Build status]: /images/20230601/465f63b7cc2e44f3a364f1fbe965803e.png [Build status 1]: https://ci.appveyor.com/project/0xd4d/dnspy/branch/master/artifacts [Wiki]: https://github.com/0xd4d/dnSpy/wiki/Building-dnSpy [Click here]: https://crowdin.com/project/dnspy [Wiki 1]: https://github.com/0xd4d/dnSpy/wiki [GPLv3]: https://github.com/0xd4d/dnSpy/blob/master/dnSpy/dnSpy/LicenseInfo/GPLv3.txt [Credits]: https://github.com/0xd4d/dnSpy/blob/master/dnSpy/dnSpy/LicenseInfo/CREDITS.txt
相关 dnSpy [https://github.com/0xd4d/dnSpy/releases][https_github.com_0xd4d_dnSpy_releases] 朱雀/ 2023年06月01日 05:32/ 0 赞/ 203 阅读
相关 使用反编译工具dnspy动态修改代码 目前dnspy的最新版是6.0 今天使用的是4.5.3来演示,因为6.0需要安装.NET4.7.2,但是电脑内存快不足了,推荐大家使用最新版6.0 1.打开dnspy b 小灰灰/ 2022年04月23日 11:02/ 5 赞/ 6022 阅读
还没有评论,来说两句吧...