Skip to content

Tags: googol-lab/pwndbg

Tags

2023.07.17

Toggle 2023.07.17's commit message
Set version to 2023.07.17

ubuntu18.04-final

Toggle ubuntu18.04-final's commit message
Set version to 2023.07.17

debian10-final

Toggle debian10-final's commit message
Set version to 2023.07.17

2023.03.19

Toggle 2023.03.19's commit message
Set version to 2023.03.19

2022.12.19

Toggle 2022.12.19's commit message
Update tests.yml

2022.08.30

Toggle 2022.08.30's commit message
bump version

2022.01.05

Toggle 2022.01.05's commit message
Set docs version to 2022.01.05

2021.06.22

Toggle 2021.06.22's commit message
Update links to use Discord

2020.07.23

Toggle 2020.07.23's commit message

Verified

This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
Fix disasm call target display when symbol is known (pwndbg#801)

This commit fixes the issue described in pwndbg#772 (comment)

tl;dr: when we displayed a known constant call instruction like
`call qword ptr [rip + 0x1c7d2]` when it called a known symbol we only
displayed the target address instead of the symbol.

Now, we will display only the target address.

Note that there are still cases when we can display both. This can
happen for example for a `ret` instruction (even without emulation).

This commit extends a comment around that code to give such example.

2019.12.09

Toggle 2019.12.09's commit message