+ Reply to Thread
Results 1 to 4 of 4

Thread: Blackbone - memory hacking library

  1. #1

    Default Blackbone - memory hacking library

    Решил зарепостить свои опен-сорс проекты и сюда.
    Собсвенно либа удалённого взаимодествия с памятью процесса - OS windows.

    Фичи:
    - x86 and x64 support

    Process interaction
    - Manage PEB32/PEB64
    - Manage process through WOW64 barrier

    Process Memory
    - Allocate and free virtual memory
    - Change memory protection
    - Read/Write virtual memory

    - Process modules
    - Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader list/Section objects/PE headers methods.
    - Get exported function address
    - Get the main module
    - Unlink module from loader lists
    - Inject and eject modules (including pure IL images)
    - Inject 64bit modules into WOW64 processes
    - Manually map native PE images

    Threads
    - Enumerate threads
    - Create and terminate threads. Support for cross-session thread creation.
    - Get thread exit code
    - Get main thread
    - Manage TEB32/TEB64
    - Join threads
    - Suspend and resume threads
    - Set/Remove hardware breakpoints

    Pattern search
    - Search for arbitrary pattern in local or remote process

    Remote code execution
    - Execute functions in remote process
    - Assemble own code and execute it remotely
    - Support for cdecl/stdcall/thiscall/fastcall conventions
    - Support for arguments passed by value, pointer or reference, including structures
    - FPU types are supported
    - Execute code in new thread or any existing one

    Remote hooking
    - Hook functions in remote process using int3 or hardware breakpoints
    - Hook functions upon return

    Manual map features
    - x86 and x64 image support
    - Mapping into any arbitrary unprotected process
    - Section mapping with proper memory protection flags
    - Image relocations (only 2 types supported. I haven't seen a single PE image with some other relocation types)
    - Imports and Delayed imports are resolved
    - Bound import is resolved as a side effect, I think
    - Module exports
    - Loading of forwarded export images
    - Api schema name redirection
    - SxS redirection and isolation
    - Activation context support
    - Dll path resolving similar to native load order
    - TLS callbacks. Only for one thread and only with PROCESS_ATTACH/PROCESS_DETACH reasons.
    - Static TLS
    - Exception handling support (SEH and C++)
    - Adding module to some native loader structures(for basic module api support: GetModuleHandle, GetProcAdress, etc.)
    - Security cookie initialization
    - C++/CLI images are supported
    - Image unloading
    - Increase reference counter for import libraries in case of manual import mapping
    - Cyclic dependencies are handled properly
    Компилится в студии 2013 или выше (используется много фич С++11 которые не поддерживаются более ранними версиями). Возможно добавлю поддержку других компиляторов когда-нибудь...

    Лицензия - MIT. Зависимости распространяются под собственными лицензиями.

    Репозиторий - Blckbone - github

    Там же лежит тестовое приложение демонстрирующее основные функции.

  2. 11 пользователя(ей) сказали cпасибо:
    0xDADA11C7 (22-12-2014) 0xF00 (14-03-2015) Dark Koder (24-05-2014) Datchanin (24-05-2014) JKornev (28-05-2014) Mosc (24-05-2014) keyst0rke (25-05-2014) nezlooy (24-05-2014) root (24-05-2014) ximera (24-05-2014) xmkcaq (06-02-2015)
  3. #2
    JKornev's Avatar

    Default Re: Blackbone - memory hacking library

    Есть ли фитча перечисления модулей 64 битного процесса из 32 битного?

  4. #3

    Default Re: Blackbone - memory hacking library

    Да.

  5. #4
    JKornev's Avatar

    Default Re: Blackbone - memory hacking library

    Неплохо, спасибо за релиз

+ Reply to Thread

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
All times are GMT. The time now is 01:30
vBulletin® Copyright ©2000 - 2018
www.reverse4you.org