Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Speed up completion hook shellcode

See original GitHub issue

@evanunderscore interest

In the course of looking into #278, I’ve become concerned about the performance impact of pkg_resources.iter_entry_points() in

I’d like us to profile the completion hook shellcode. We might want to use techniques developed by to speed up entry point scanning, or look for other ways to speed up the shellcode.

Issue Analytics

  • State:open
  • Created 4 years ago
  • Comments:6 (3 by maintainers)

github_iconTop GitHub Comments

kislyukcommented, May 23, 2020

We are not actively maintaining support for Python 2, and I expect to drop all Python 2-specific compatibility code sometime later this year. In general we will follow EOL announcements from upstream to decide when to drop support, and in case of Python 2.7, EOL was January 1, 2020.

evanunderscorecommented, May 23, 2020

Are we similarly considering dropping support for Python 2? It reached EOL at the beginning of this year, but I can understand making a special case for it given how prevalent it still is. However as time goes on, our dependencies will drop support for it and the burden of maintaining it will grow. Do you have any thoughts around this?

Read more comments on GitHub >

github_iconTop Results From Across the Web

WOW64 Subsystem Internals and Hooking Techniques
This blog post is broken up into two sections. First we start by diving deep into the WOW64 system. To do this, we...
Read more >
PE Parsing and Defeating AV/EDR API Hooks in C++
This post is a look at defeating AV/EDR-created API hooks, using code originally written by @spotless located here.
Read more >
Path to Process Injection — Bypass Userland API Hooking
We can inject: 1. Entire portable executable (PE) into another running process such as injecting a reverse shellcode binary or executable;. 2.
Read more >
Command and Shell Code Injection Scenarios with Commix ...
Of course, nobody has harmed at Monastiraki during this article. Instead, several Virtual Machines were set up to substitute the cafe clients.
Read more >
scdbg shellcode analysis - Sandsprite
D:\>scdbg -i -f ./sc/ Loaded 21b bytes from file ./sc/ Initialization Complete.. Interactive Hooks enabled Max Steps: 2000000 Using base ...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Post

No results found

github_iconTop Related Hashnode Post

No results found