Pyrasite - Inject code into a running Python process
September 19 2011, 4:44 PM
This lets you easily introspect and alter any objects in your running process.
$ python >>> x = 'foo'$ pyrasite <PID> payloads/reverse_python_shell.py $ nc -l localhost 9001 Python 2.7.1 (r271:86832, Apr 12 2011, 16:15:16) [GCC 4.6.0 20110331 (Red Hat 4.6.0-2)] Type 'quit' to exit. >>> print x foo >>> globals()['x'] = 'bar'
via fedorahosted.org
Cool debugging tool. Has nice wrapper for meliae Python memory analyser (https://launchpad.net/meliae). Via http://news.ycombinator.com/item?id=3014484.