lolhesap / EasySafe

Known ring3 memory protections that can be handled at a simple level.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

EasySafe


Known ring3 memory protections that can be handled at a simple level.

Example usage

Check Example.cpp

Syscall hooking

  1. Add a syscall hook
  2. Specify the action to be taken when the syscall you hooked is called. You can spoof the R10 and RAX values. (RAX is the value returned.)
  3. If syscalls are not invoked safely in the process safe method, your callback will be executed.
  4. The callback is called as it appears and the RAX is spoofed.

LoadLibrary protection

There are many ways to inject a dynamic link library using LoadLibrary in the process.

In either case, LoadLibrary will reference LdrLoadDll, which is still an internal function. In EasySafe, you can add certain dlls to the allowlist and call your callback without loading the rest.

About

Known ring3 memory protections that can be handled at a simple level.

License:MIT License


Languages

Language:C++ 88.0%Language:C 11.0%Language:Assembly 1.0%