0vercl0k / wtf

wtf is a distributed, code-coverage guided, customizable, cross-platform snapshot-based fuzzer designed for attacking user and / or kernel-mode targets running on Microsoft Windows and Linux user-mode (experimental!).

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

fix argument handling to not trigger post mortem debugger

0vercl0k opened this issue · comments

ucrtbase!abort+0x4e:
00007ffa`a0c4f61e cd29            int     29h

0:000> kc
 # Call Site
00 ucrtbase!abort
01 ucrtbase!terminate
02 wtf!__scrt_unhandled_exception_filter
03 KERNELBASE!UnhandledExceptionFilter
04 ntdll!RtlUserThreadStart$filt$0
05 ntdll!_C_specific_handler
06 ntdll!RtlpExecuteHandlerForException
07 ntdll!RtlDispatchException
08 ntdll!RtlRaiseException
09 KERNELBASE!RaiseException
0a VCRUNTIME140!_CxxThrowException
0b wtf!`main'::`2'::<lambda_2>::operator()
0c wtf!std::_Func_class<void>::operator()
0d wtf!CLI::App::run_callback
0e wtf!CLI::App::run_callback
0f wtf!CLI::App::parse
10 wtf!CLI::App::parse
11 wtf!main
12 wtf!invoke_main
13 wtf!__scrt_common_main_seh
14 KERNEL32!BaseThreadInitThunk
15 ntdll!RtlUserThreadStart