Api Break is a x64dbg plugin which is aimed to set breakpoints Win32/64 API calls easly.
####Features
- API function entry breakpoint (AEB)
- Breakpoint at API callers (BAC)
- Auto-populating modules and their API functions used by the process.
It can be useful when the code does obfuscated or indirect api calls or something similar conditions. This mode is automatically (naturally) handles all API calls for the entire module. Also, this mode gives an option to jump automatically to the API caller when the API entry breakpoint hit. It exposes the original caller using single step callstack backtracing.
In technically, this mode is much more flexible and customizable. It does scan dynamically for API calls in specified module or address range. For now, it scans only process's code range. But other features are planned for future development.
If you have any idea, let me know what ideas you have about it.
#####In-Development features
- Dynamically loaded API detection which is made by using GetProcAddress (About 45% implemented)
#####Planning features
- User specified code range scan for BAC
- User specified module scan for BAC
- User option to listing all linked modules and APIs of process regardless of IAT.