Skip to content

Commit

Permalink
Add missing doc sources
Browse files Browse the repository at this point in the history
  • Loading branch information
hakril committed Oct 14, 2017
1 parent 2094ab4 commit c3f9d87
Show file tree
Hide file tree
Showing 9 changed files with 213 additions and 52 deletions.
12 changes: 8 additions & 4 deletions docs/source/crypto.rst
Original file line number Diff line number Diff line change
Expand Up @@ -30,9 +30,17 @@ import_pfx
.. autofunction:: import_pfx



Certificate
"""""""""""

.. warning::

The classes described here are under heavy test and try.

The classes, methods and properties described here will problably change as I haven't yet had the time
to try it out in real cases and figure out the final look of the API I want to do.

.. note::

See sample :ref:`sample_crypto_certificate`
Expand All @@ -54,10 +62,6 @@ CryptObject

.. autoclass:: CryptObject

.. warning::

The methods and property of this class will problably change as I haven't yet had the time
to try it out in real cases.


CryptContext
Expand Down
1 change: 0 additions & 1 deletion docs/source/generated.rst
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,6 @@ Here is every generated definition by type:

.. toctree::
:maxdepth: 1
:numbered:

windef_generated.rst
ntstatus_generated.rst
Expand Down
1 change: 1 addition & 0 deletions docs/source/ntstatus_generated.rst
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
.. currentmodule:: windows.generated_def

Ntstatus
--------
.. autodata:: STATUS_SUCCESS
Expand Down
4 changes: 2 additions & 2 deletions docs/source/rpc.rst
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,7 @@ Epmapper
:exclude-members: count, index

:func:`find_alpc_endpoints`
'''''''''''''''''''''''''
'''''''''''''''''''''''''''

.. autofunction:: find_alpc_endpoints

Expand Down Expand Up @@ -210,7 +210,7 @@ Each NDR class has a function :func:`pack`.


NDR STREAM
^^^^^^^^^^
''''''''''

.. autoclass:: NdrStream

Expand Down
14 changes: 7 additions & 7 deletions docs/source/sample.rst
Original file line number Diff line number Diff line change
Expand Up @@ -186,7 +186,7 @@ Output::

Output::

(cmd λ) python.exe network.py
(cmd λ) python.exe network\network.py
Working on ipv4
== Listening ==
Some listening connections: [<TCP IPV4 Listening socket on 0.0.0.0:80>, <TCP IPV4 Listening socket on 0.0.0.0:135>, <TCP IPV4 Listening socket on 0.0.0.0:443>]
Expand Down Expand Up @@ -413,7 +413,7 @@ Ouput::

Ouput::

(cmd λ) python.exe debug\debug\attach.py
(cmd λ) python.exe debug\attach.py
Finding process with pid <11392>
Target is <WinProcess "notepad.exe" pid 11392 at 0x471a750>
Debugger attached: <windows.debug.debugger.Debugger object at 0x04707EF0>
Expand Down Expand Up @@ -441,7 +441,7 @@ Native code tester

Ouput::

(cmd λ) python.exe .\samples\test_code.py "mov eax, 0x42424242" "eax=0x11223344"
(cmd λ) python.exe test_code.py "mov eax, 0x42424242" "eax=0x11223344"
Testing x86 code
Startup context is:
Eip -> 0x3f0000L
Expand Down Expand Up @@ -473,7 +473,7 @@ Ouput::
Eax: 0x11223344 -> 0x42424242 (+0x31200efe)


(cmd λ) python64 .\samples\test_code.py --x64 "mov r15, 0x11223344; push r14; call r15" "rcx=1; r14=0x4242424243434343"
(cmd λ) python64 test_code.py --x64 "mov r15, 0x11223344; push r14; call r15" "rcx=1; r14=0x4242424243434343"
Testing x64 code
Startup context is:
Rip -> 0x205a1d60000L
Expand Down Expand Up @@ -720,7 +720,7 @@ Ouput::
Found it !

== PE Analysis ==
Target sha1 = <059cb1ba1a41433a18dd8f87422c2ac3bf35b7b8>
Target sha1 = <eb90bc0e33f3e62b0eac4afa8bfcf42a5d4e7bbb>
Analysing <CryptObject "C:\windows\system32\ntdll.dll" content_type=CERT_QUERY_CONTENT_PKCS7_SIGNED_EMBED(0xaL)>
File has 1 signer(s):
Signer 0:
Expand Down Expand Up @@ -866,7 +866,7 @@ Manual UAC

Output::

(cmd λ) python samples\rpc\uac.py
(cmd λ) python rpc\uac.py
Namespace(cmdline='', creationflags=CREATE_UNICODE_ENVIRONMENT(0x400L), target='C:\\Python27\\python.exe', uacflags=17)
# UAC pop - asking to execute python.exe | Clicking Yes
Return value = 0x6
Expand All @@ -890,7 +890,7 @@ Manual ``LsarEnumeratePrivileges``

Output::

(cmd λ) python samples\rpc\lsass.py
(cmd λ) python rpc\lsass.py
(2, u'SeCreateTokenPrivilege')
(3, u'SeAssignPrimaryTokenPrivilege')
(4, u'SeLockMemoryPrivilege')
Expand Down
1 change: 1 addition & 0 deletions docs/source/windef_generated.rst
Original file line number Diff line number Diff line change
@@ -1,4 +1,5 @@
.. currentmodule:: windows.generated_def

Windef
------
.. autodata:: INVALID_HANDLE_VALUE
Expand Down
4 changes: 4 additions & 0 deletions docs/source/windows.rst
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,12 @@ The defaults objects accessible in ``windows`` are:
The submodules that you might use by themself are:
* :mod:`windows.native_exec`
* :mod:`windows.winproxy`
* :mod:`windows.wintrust`
* :mod:`windows.crypto`
* :mod:`windows.utils`
* :mod:`windows.debug`
* :mod:`windows.alpc`
* :mod:`windows.rpc`
* :mod:`windows.com`

.. _object_system:
Expand Down
Loading

0 comments on commit c3f9d87

Please sign in to comment.