无名 发表于 2022-5-8 15:33:23

基地址工击分析

且行且珍惜吧,有些东西丢了很难回来的。
http://wglo.cn/view.php/209bbad07ed4a536a3d4cb253405ac00.mp4
如果不懂,视频教程【上面】
xs内存工具
https://wwa.lanzoui.com/ioGOZtmp3uj
基地址偏移修改
https://wwa.lanzoui.com/ihkTmu6bzhe
基地址查询
https://wwa.lanzoui.com/it7IJu6bzgd
上面是[滑稽]
下面是[乖]
八爪鱼框架
http://wglo.cn/down.php/6312309ded012ae094a9a8dfd8df2162.apk
腾讯模拟器框架
http://wglo.cn/down.php/485bc376894a3ef0849e72ee0e6c230d.apk
虚拟xp框架
http://wglo.cn/down.php/bdf48f7abd95eb1d40f570c06d17c9ad.apk
源代码
--name为模块的名字;offset为要修改的数据距离模块头地址的偏移量,10进制或16进制都可以
--value为要修改为何值;flags为类型;freeze为是否冻结(冻结为true,不冻结为false)

function setBaseAddress(name, offset, value, flags, freeze)
        local addr = gg.getRangesList(name)["start"] + offset
        local tb = {{["address"] = addr, ["value"] = value , ["flags"] = flags, ["freeze"] = freeze}}
        gg.setValues(tb)
        gg.addListItems(tb)
end

setBaseAddress("libsandhook.so", 0X4, 2021, 4, true)
setBaseAddress("libsandhook.so", 0X8, 1314, 16, false)
* iphorm: (https://草率了没注意看/qfy-content/plugins/qfy_form/css/styles.css)*/
        @media screen and (max-width:768px) {
        body .iphorm-group-alignment-proportional>.iphorm-group-elements>.iphorm-group-row-2cols>.iphorm-element-wrap,body .iphorm-group-alignment-proportional>.iphorm-group-elements>.iphorm-group-row-2cols>.iphorm-group-wrap, body .iphorm-group-alignment-proportional>.iphorm-group-elements>.iphorm-group-row-3cols>.iphorm-element-wrap,body .iphorm-group-alignment-proportional>.iphorm-group-elements>.iphorm-group-row-3cols>.iphorm-group-wrap, body .iphorm-group-alignment-proportional .iphorm-group-row-4cols>.iphorm-element-wrap,body .iphorm-group-alignment-proportional .iphorm-group-row-4cols>.iphorm-group-wrap, body .iphorm-gro#headerup-alignment-proportional .iphorm-group-:100%!important;
}
body .iphorm-elements table.leftright .iphorm-submit-wrap .iphorm-submit-input-wrap {

http://cdn.u1.huluxia.com/g4/M01/B3/34/rBAAdmFTHpSAL3jsAAK3YKUalBA97.jpeghttp://cdn.u1.huluxia.com/g4/M01/B3/34/rBAAdmFTHpWAPojHAAJ7QToJ-js349.pnghttp://cdn.u1.huluxia.com/g4/M01/B3/34/rBAAdmFTHpaAJdacAAHH21oCNhg329.jpg
页: [1]
查看完整版本: 基地址工击分析