You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
114 lines
2.8 KiB
114 lines
2.8 KiB
#pragma once
|
|
#include <windows.h>
|
|
#include <string_view>
|
|
#include <vector>
|
|
#include <thread>
|
|
#include <atomic>
|
|
#include <mutex>
|
|
#include "../vdm/vdm.hpp"
|
|
|
|
namespace vdm
|
|
{
|
|
// change this to whatever you want :^)
|
|
constexpr std::pair<const char*, const char*> syscall_hook = { "NtGdiDdDDICreateContext", "win32u.dll" };
|
|
|
|
inline std::atomic<bool> is_page_found = false;
|
|
inline std::atomic<void*> syscall_address = nullptr;
|
|
|
|
inline std::uint16_t nt_page_offset;
|
|
inline std::uint32_t nt_rva;
|
|
inline std::uint8_t* dxgkrnl_buffer;
|
|
|
|
class vdm_ctx
|
|
{
|
|
public:
|
|
vdm_ctx();
|
|
template <class T, class ... Ts>
|
|
__forceinline std::invoke_result_t<T, Ts...> syscall(void* addr, Ts ... args) const
|
|
{
|
|
static const auto proc =
|
|
GetProcAddress(
|
|
LoadLibraryA(syscall_hook.second),
|
|
syscall_hook.first
|
|
);
|
|
|
|
static std::mutex syscall_mutex;
|
|
syscall_mutex.lock();
|
|
|
|
// jmp [rip+0x0]
|
|
std::uint8_t jmp_code[] =
|
|
{
|
|
0xff, 0x25, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00
|
|
};
|
|
|
|
std::uint8_t orig_bytes[sizeof jmp_code];
|
|
*reinterpret_cast<void**>(jmp_code + 6) = addr;
|
|
vdm::read_phys(vdm::syscall_address.load(), orig_bytes, sizeof orig_bytes);
|
|
|
|
// execute hook...
|
|
vdm::write_phys(vdm::syscall_address.load(), jmp_code, sizeof jmp_code);
|
|
auto result = reinterpret_cast<T>(proc)(args ...);
|
|
vdm::write_phys(vdm::syscall_address.load(), orig_bytes, sizeof orig_bytes);
|
|
|
|
syscall_mutex.unlock();
|
|
return result;
|
|
}
|
|
|
|
template <class T>
|
|
__forceinline auto rkm(std::uintptr_t addr) -> T
|
|
{
|
|
static const auto ntoskrnl_memcpy =
|
|
util::get_kmodule_export("ntoskrnl.exe", "memcpy");
|
|
|
|
T buffer;
|
|
this->syscall<decltype(&memcpy)>(
|
|
ntoskrnl_memcpy, &buffer, (void*)addr, sizeof T);
|
|
|
|
return buffer;
|
|
}
|
|
|
|
template <class T>
|
|
__forceinline void wkm(std::uintptr_t addr, const T& value)
|
|
{
|
|
static const auto ntoskrnl_memcpy =
|
|
util::get_kmodule_export("ntoskrnl.exe", "memcpy");
|
|
|
|
this->syscall<decltype(&memcpy)>(
|
|
ntoskrnl_memcpy, (void*)addr, &value, sizeof T);
|
|
}
|
|
|
|
__forceinline auto get_virtual(std::uintptr_t addr) -> std::uintptr_t
|
|
{
|
|
static const auto ntoskrnl_get_virtual =
|
|
util::get_kmodule_export(
|
|
"ntoskrnl.exe",
|
|
"MmGetVirtualForPhysical");
|
|
|
|
return this->syscall<MmGetVirtualForPhysical>(
|
|
ntoskrnl_get_virtual, addr);
|
|
}
|
|
|
|
__forceinline auto get_peprocess(std::uint32_t pid) -> PEPROCESS
|
|
{
|
|
static const auto ps_lookup_peproc =
|
|
util::get_kmodule_export(
|
|
"ntoskrnl.exe",
|
|
"PsLookupProcessByProcessId");
|
|
|
|
PEPROCESS peproc = nullptr;
|
|
this->syscall<PsLookupProcessByProcessId>(
|
|
ps_lookup_peproc,
|
|
(HANDLE)GetCurrentProcessId(),
|
|
&peproc
|
|
);
|
|
|
|
return peproc;
|
|
}
|
|
private:
|
|
void locate_syscall(std::uintptr_t begin, std::uintptr_t end) const;
|
|
bool valid_syscall(void* syscall_addr) const;
|
|
};
|
|
} |