We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
直接下载按照文档编译,执行inject后立即退出了程序,界面没有绘制 日志如下: 07-02 18:31:14.804 16855 16855 W INJECT : [+] Injecting process: 641 07-02 18:31:14.807 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0] 07-02 18:31:14.807 16855 16855 W INJECT : [+] Remote mmap address: 77937fb410 07-02 18:31:14.807 16855 16855 W INJECT : [+] Calling mmap in target process. 07-02 18:31:14.807 16855 16855 W INJECT : [+] Target process returned from mmap, return value=0, pc=77937fb410 07-02 18:31:14.809 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0] 07-02 18:31:14.813 16855 16855 I chatty : uid=0(root) ./inject identical 2 lines 07-02 18:31:14.815 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0] 07-02 18:31:14.815 16855 16855 W INJECT : [+] Get imports: dlopen: 7793605014, dlsym: 7793605040, dlclose: 7793605084, dlerror: 779360502c 07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlopen in target process. 07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlopen, return value=0, pc=7793605014 07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlerror in target process. 07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlerror, return value=0, pc=779360502c 07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlsym in target process. 07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlsym, return value=0, pc=7793605040 07-02 18:31:14.815 16855 16855 W INJECT : hook_entry_addr666 = 0x0 07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling hook_entry in target process. 07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from hook_entry, return value=200, pc=0
这个hook_entry的地址是不是有问题?
The text was updated successfully, but these errors were encountered:
No branches or pull requests
直接下载按照文档编译,执行inject后立即退出了程序,界面没有绘制
日志如下:
07-02 18:31:14.804 16855 16855 W INJECT : [+] Injecting process: 641
07-02 18:31:14.807 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.807 16855 16855 W INJECT : [+] Remote mmap address: 77937fb410
07-02 18:31:14.807 16855 16855 W INJECT : [+] Calling mmap in target process.
07-02 18:31:14.807 16855 16855 W INJECT : [+] Target process returned from mmap, return value=0, pc=77937fb410
07-02 18:31:14.809 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.813 16855 16855 I chatty : uid=0(root) ./inject identical 2 lines
07-02 18:31:14.815 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.815 16855 16855 W INJECT : [+] Get imports: dlopen: 7793605014, dlsym: 7793605040, dlclose: 7793605084, dlerror: 779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlopen in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlopen, return value=0, pc=7793605014
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlerror in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlerror, return value=0, pc=779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlsym in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlsym, return value=0, pc=7793605040
07-02 18:31:14.815 16855 16855 W INJECT : hook_entry_addr666 = 0x0
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling hook_entry in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from hook_entry, return value=200, pc=0
这个hook_entry的地址是不是有问题?
The text was updated successfully, but these errors were encountered: