module documentation
Parsing of Windows 10 handles from handle tables
Some pointers to explanation of handles:
- https://ntamonsec.blogspot.com/2020/06/journey-into-object-manager-executive-handles.html
- https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-part-5-a-journey-in-to-the-undocumented-process-handle-structures-_handle_table-_handle_table_entry/
Class |
|
A class representing a Windows handle at a specific context. |
Class | _ |
Undocumented |
Class | _ |
Undocumented |
Class | _ |
Undocumented |
Class | _ |
Undocumented |
Class | _ |
Undocumented |
Class | _ |
Class built by reversing the function `ExpLookupHandleTableEntry` of the kernel |
Class | _ |
Undocumented |
Function | _negative |
Undocumented |
Variable | _special |
Undocumented |
def _negative_to_positive_two_complement(ctx, value):
Undocumented
Parameters | |
ctx:reven2.trace.Context | Undocumented |
value:int | Undocumented |
Returns | |
int | Undocumented |