安卓内核编译 设备:Oneplus 5 内核源码:https://github.com/MoKee/android_kernel_oneplus_msm8998 编译器:gcc-arm-9.2 编译脚本: 12345678910export ARCH=arm64export SUBARCH=arm64export AARCH64=/home/rog/project/android_kernel/toolchai 2023-01-30 安卓 #编译 #汇编 #内核 #驱动 #Android
UE4 FName & GObject FName就是NamePoolDataGObject就是GUObjectArray 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950__int64 __fastcall FName::GetPlainNameString(_DWORD *a1, __int64 a2 2022-09-20 游戏安全 #UE4
x64通过页表自映射计算PTE_BASE 1234567891011121314151617181920//InitializePteBase(__readcr3());VOID InitializePteBase(ULONG64 dirbase){ PHYSICAL_ADDRESS phAddr = { 0 }; ULONG64 slot = 0; ULONG_PTR pfn = dirb 2022-08-06 内核 #分页 #汇编
x64分页 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950cr3=00000000001ad000gdtr=fffff8003f677fb0kd> !vtop 00000000001ad000 fffff8003f677fb0Amd64VtoP: Virt fffff8 2022-07-06 内核 #分页 #汇编
X86 Assembly Instructions 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210 2022-04-24 内核 #汇编
ObRegisterCallbacks C0000022错误 环境:Win7 x64 ntoskrnl.exe12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929 2022-02-23 内核 #汇编 #内核
逆向分析MmIsAddressValid 近期跟海哥学习了系统底层的一些知识,此处使用IDA对MmIsAddressValid进行逆向分析,以加深对Windows分页机制的了解废话不多说,上代码 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354;环境:Windows7 x32 ntoskr 2022-01-04 内核 #分页 #逆向
切换CR3跨进程读写内存 环境:XPx32、Win7x32 项目历时三天,最终在朋友的帮助下,搞成功了! 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848 2022-01-03 内核 #驱动
中断门陷阱门提权 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102 2021-12-16 内核 #内核
Win7x32 PAE分页2-9-9-12 12345678910111213141516171819202122230035e5f80000 0000 0011 0101 1110 0101 1111 1000//////////2-9-9-12///////////x800 = 00 0000 0001 = 11 0101 1110 = 15e0101 1111 1000 = 5f8kd> !vtop 7f322500 0035e 2021-12-12 内核 #分页 #汇编