module documentation
        
        Parsing of Windows 10 handles from handle tables
Some pointers to explanation of handles:
- https://ntamonsec.blogspot.com/2020/06/journey-into-object-manager-executive-handles.html
 - https://eforensicsmag.com/windows-process-internals-a-few-concepts-to-know-before-jumping-on-memory-forensics-part-5-a-journey-in-to-the-undocumented-process-handle-structures-_handle_table-_handle_table_entry/
 
| Class |  | 
    A class representing a Windows handle at a specific context. | 
| Class | _ | 
    Undocumented | 
| Class | _ | 
    Undocumented | 
| Class | _ | 
    Undocumented | 
| Class | _ | 
    Undocumented | 
| Class | _ | 
    Undocumented | 
| Class | _ | 
    Class built by reversing the function `ExpLookupHandleTableEntry` of the kernel | 
| Class | _ | 
    Undocumented | 
| Function | _negative | 
    Undocumented | 
| Variable | _special | 
    Undocumented | 
    
    def _negative_to_positive_two_complement(ctx, value):
    
  
  Undocumented
| Parameters | |
ctx:reven2.trace.Context | Undocumented | 
value:int | Undocumented | 
| Returns | |
int | Undocumented |