利用 Blackbone 做进程保护

BlackboneWindows memory hacking library
[

](https://github.com/DarthTon/Blackbone#features)Features
x86 and x64 support

Process interaction
Manage PEB32/PEB64
Manage process through WOW64 barrier

Process Memory
Allocate and free virtual memory
Change memory protection
Read/Write virtual memory

Process modules
Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader list/Section objects/PE headers methods.
Get exported function address
Get the main module
Unlink module from loader lists
Inject and eject modules (including pure IL images)
Inject 64bit modules into WOW64 processes
Manually map native PE images

Threads
Enumerate threads
Create and terminate threads. Support for cross-session thread creation.
Get thread exit code
Get main thread
Manage TEB32/TEB64
Join threads
Suspend and resume threads
Set/Remove hardware breakpoints

Pattern search
Search for arbitrary pattern in local or remote process

Remote code execution
Execute functions in remote process
Assemble own code and execute it remotely
Support for cdecl/stdcall/thiscall/fastcall conventions
Support for arguments passed by value, pointer or reference, including structures
FPU types are supported
Execute code in new thread or any existing one

Remote hooking
Hook functions in remote process using int3 or hardware breakpoints
Hook functions upon return

Manual map features
x86 and x64 image support
Mapping into any arbitrary unprotected process
Section mapping with proper memory protection flags
Image relocations (only 2 types supported. I haven't seen a single PE image with some other relocation types)
Imports and Delayed imports are resolved
Bound import is resolved as a side effect, I think
Module exports
Loading of forwarded export images
Api schema name redirection
SxS redirection and isolation
Activation context support
Dll path resolving similar to native load order
TLS callbacks. Only for one thread and only with PROCESS_ATTACH/PROCESS_DETACH reasons.
Static TLS
Exception handling support (SEH and C++)
Adding module to some native loader structures(for basic module api support: GetModuleHandle, GetProcAdress, etc.)
Security cookie initialization
C++/CLI images are supported
Image unloading
Increase reference counter for import libraries in case of manual import mapping
Cyclic dependencies are handled properly

Driver features

Allocate/free/protect user memory
Read/write user and kernel memory
Disable permanent DEP for WOW64 processes
Change process protection flag
Change handle access rights
Remap process memory
Hiding allocated user-mode memory
User-mode dll injection and manual mapping
Manual mapping of drivers

[

](https://github.com/DarthTon/Blackbone#license)License
Blackbone is licensed under the MIT License. Dependencies are under their respective licenses.

最后编辑于
©著作权归作者所有,转载或内容合作请联系作者
【社区内容提示】社区部分内容疑似由AI辅助生成,浏览时请结合常识与多方信息审慎甄别。
平台声明:文章内容(如有图片或视频亦包括在内)由作者上传并发布,文章内容仅代表作者本人观点,简书系信息发布平台,仅提供信息存储服务。

相关阅读更多精彩内容

  • 预想计算器图为: 如何实现? 1.画出计算器框架图2.设置button的监听事件,在监听中实现将值传入到JText...
    beautymo阅读 1,199评论 0 1
  • 正阳二月十号回来漂泊的城市,原以为可以好好找份工作可以踏踏实实的干,可现实就那么现实,找了份底薪工作,怎么说也熬3...
    第六阅读 271评论 0 0
  • 从今天起每一个节日都和从前不一样装坚强却变成慌张思念无处安放 从今天起每一次举杯都和从前不一样酒照常一喝喝出心慌寂...
    王安迪阅读 306评论 5 6
  • ⊙∀⊙!好像好多天没写了,值得开心的是终于放假回家了,让人悲伤的事是突然发现没有什么事是我真正热爱和喜欢的,是不是...
    似木阅读 436评论 0 1

友情链接更多精彩内容