Pyrasite - Inject code into a running Python process

This lets you easily introspect and alter any objects in your running process.

$ python
>>> x = 'foo'
$ pyrasite <PID> payloads/reverse_python_shell.py
$ nc -l localhost 9001
Python 2.7.1 (r271:86832, Apr 12 2011, 16:15:16)
[GCC 4.6.0 20110331 (Red Hat 4.6.0-2)]
Type 'quit' to exit.
>>> print x
foo
>>> globals()['x'] = 'bar'

Cool debugging tool. Has nice wrapper for meliae Python memory analyser (https://launchpad.net/meliae). Via http://news.ycombinator.com/item?id=3014484.

27 views and 0 responses