The translation preserves the markdown formatting, keeps technical terms in English, and maintains the same structure. Would you like me to proceed with translating the rest of the text once you provide the additional content?
dnSpy represents the pinnacle of .NET reverse engineering and debugging technology, serving as the most comprehensive and powerful tool available for analyzing, debugging, and modifying .NET applications and libraries. This exceptional open-source debugger and assembly editor has revolutionized .NET security research by providing unprecedented access to managed code, enabling security analysts, malware researchers, and software developers to understand complex .NET applications with remarkable depth and precision. What sets dnSpy apart from other .NET analysis tools is its seamless integration of multiple critical capabilities: high-quality decompilation that reconstructs readable C# code from compiled assemblies, full-featured debugging with breakpoints and variable inspection, real-time assembly editing and patching, and comprehensive metadata analysis. The tool's sophisticated decompiler can handle obfuscated code, complex control flows, and modern C# language features, while its debugger provides the same level of functionality as Visual Studio for analyzing both managed and mixed-mode applications. dnSpy's ability to modify assemblies in real-time, combined with its powerful search capabilities and intuitive interface, makes it an indispensable tool for .NET malware analysis, vulnerability research, software protection bypass, and general reverse engineering tasks.
# Decompiler Settings# File -> Settings -> Decompiler# Language: C#, Visual Basic, IL# Show XML documentation comments: Enable# Show assembly references: Enable# Show type definitions: Enable# Use hex numbers: Configure preference# Show tokens: Enable for advanced analysis# Debugger Configuration# File -> Settings -> Debugger# Break on module load: Configure# Break on process exit: Configure# Ignore breakpoints: Configure# Enable just my code: Disable for full analysis# Suppress JIT optimization: Enable# Hex Editor Settings# File -> Settings -> Hex Editor# Bytes per line: 16 (default)# Use hex prefix: 0x# Show ASCII: Enable# Font configuration# Assembly Editor Settings# File -> Settings -> Assembly Editor# Auto-save: Configure# Backup original files: Enable# Show line numbers: Enable# Syntax highlighting: Enable# Theme and Appearance# File -> Settings -> Appearance# Theme: Dark, Light, Blue, High Contrast# Font family and size# Syntax highlighting colors# Window layout preferences# Plugin Management# Extensions directory: dnSpy/Extensions/# Plugin loading: Automatic on startup# Custom plugin development support# Community plugins available
# Automatic Decompilation# Click on any type or method# dnSpy automatically decompiles to C## View reconstructed source code# Analyze program logic and flow# Decompilation Languages# View -> Language# C# (default and recommended)# Visual Basic .NET# IL (Intermediate Language)# Switch between languages for different perspectives# Method Analysis# Double-click method to view implementation# Analyze method parameters and return types# View local variables and their types# Examine exception handling blocks# Property and Field Analysis# View property getters and setters# Analyze field initialization# Examine auto-implemented properties# Check access modifiers and attributes# Event Analysis# View event declarations# Analyze event handlers# Examine add/remove accessors# Check event invocation patterns# Generic Type Analysis# View generic type definitions# Analyze type constraints# Examine generic method implementations# Check variance annotations (in/out)# Attribute Analysis# View custom attributes on types and members# Analyze attribute parameters# Examine reflection-based code# Check serialization attributes
# Text Search# Edit -> Find (Ctrl+F)# Search within current document# Case-sensitive options# Regular expression support# Whole word matching# Global Search# Edit -> Search Assemblies (Ctrl+Shift+K)# Search across all loaded assemblies# Search types, members, strings# Filter by assembly, namespace, type# Advanced search options# Go to Token# Edit -> Go to Token (Ctrl+D)# Navigate directly to metadata token# Useful for low-level analysis# Cross-reference with other tools# Go to Type/Member# Edit -> Go to Type (Ctrl+Shift+T)# Quick navigation to specific types# Autocomplete support# Fuzzy matching# Find References# Right-click on type/member -> Find References# Locate all usages across assemblies# View reference context# Navigate to reference locations# Bookmarks# Edit -> Toggle Bookmark (Ctrl+B)# Mark important locations# Navigate between bookmarks# Persistent across sessions# Navigation History# Navigate -> Back (Alt+Left)# Navigate -> Forward (Alt+Right)# Maintain navigation history# Quick return to previous locations
# Starting Debug Sessions# Debug -> Start Debugging (F5)# Debug -> Attach to Process# Debug -> Start Without Debugging (Ctrl+F5)# Process Attachment# Debug -> Attach to Process (Ctrl+Alt+P)# Select target process from list# Choose appropriate debugger type:# - Managed (.NET) code# - Native code# - Mixed mode# Debug Configuration# Debug -> Windows -> Modules# View loaded assemblies and modules# Check symbol loading status# Verify debug information availability# Just My Code Settings# Debug -> Options -> Debugging -> General# Enable/disable "Enable Just My Code"# Configure stepping behavior# Set exception handling options# Symbol Configuration# Tools -> Options -> Debugging -> Symbols# Configure symbol server locations# Set symbol cache directory# Load symbols for specific modules# Source Code Mapping# Debug -> Windows -> Source Files# Map decompiled code to original source# Configure source server settings# Handle missing source files
# Setting Breakpoints# Click in left margin of code editor# F9 to toggle breakpoint at current line# Right-click -> Insert Breakpoint# Breakpoint Types# Line breakpoints: Break at specific line# Function breakpoints: Break on method entry# Data breakpoints: Break on variable change# Exception breakpoints: Break on exceptions# Conditional Breakpoints# Right-click breakpoint -> Conditions# Set conditional expressions:# - Variable value conditions# - Hit count conditions# - Filter conditions# Breakpoint Actions# Right-click breakpoint -> Actions# Print messages to output# Execute macros or commands# Continue execution automatically# Breakpoint Management Window# Debug -> Windows -> Breakpoints (Ctrl+Alt+B)# View all breakpoints# Enable/disable breakpoints# Delete breakpoints# Export/import breakpoint settings# Advanced Breakpoint Features# Tracepoints: Log without stopping# Dependent breakpoints: Break only after others# Temporary breakpoints: Auto-remove after hit# Breakpoint groups: Organize related breakpoints
Las capacidades de análisis .NET de dnSpy, sus potentes características de depuración y edición de ensamblaje en tiempo real lo convierten en una herramienta indispensable para la investigación de seguridad .NET, análisis de malware e ingeniería inversa. Su capacidad para descompilar aplicaciones .NET complejas en código C# legible, combinada con funcionalidad de depuración completa y capacidades de modificación de ensamblaje, proporciona a los investigadores de seguridad un acceso sin precedentes al comportamiento de código administrado. Ya sea utilizado para análisis de malware, investigación de vulnerabilidades, bypass de protección de software o ingeniería inversa .NET general, dnSpy ofrece la profundidad y precisión que requiere el análisis de seguridad .NET moderno. El desarrollo activo de la herramienta y las mejoras continuas de características garantizan que se mantenga a la vanguardia de la tecnología de análisis .NET, adaptándose a nuevos marcos .NET y desafíos de seguridad mientras mantiene su posición como la plataforma líder de ingeniería inversa .NET.