Welcome![Sign In][Sign Up]
Location:
Search - KeServiceDescriptorTable

Search list

[Game Hook Crackddk

Description: 引用KeServiceDescriptorTable表 通过ServiceTableBase+偏移读出当前函数地址用windbg测试读取的值外挂源代码 -Reference Table KeServiceDescriptorTable read through ServiceTableBase+ offset address of the current function test with windbg source code to read the value of the external
Platform: | Size: 302080 | Author: sha | Hits:

[Driver DevelopLoadSSDTAddress

Description: 读出SSDT表函数地址,引用KeServiceDescriptorTable表、通过ServiceTableBase+偏移读出当前函数地址、用windbg测试读取的值-SSDT table function to read out the address, reference KeServiceDescriptorTable table, read through the ServiceTableBase+ offset address of the current function, use windbg to read the value of the test
Platform: | Size: 302080 | Author: maomao | Hits:

CodeBus www.codebus.net