-
Notifications
You must be signed in to change notification settings - Fork 49
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
18 changed files
with
1,667 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,2 +1,13 @@ | ||
# siutf8 | ||
Source insight 3.X UTF8 plugin in c language | ||
ABOUT: | ||
siutf8 is a UTF8 Support plugin for source insight 3.x. | ||
|
||
|
||
BUILD: | ||
siutf8 is build with w32-gcc,siutf8.cbp is a codeblocks project file. | ||
you can also make it use Makefile. | ||
|
||
|
||
INSTALL: | ||
copy siutf8.dll to source insight dir. | ||
you can use msimg32.dll Auto load the plugin. or use the loader.exe. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,111 @@ | ||
#include "ldasm.h" | ||
#include "hookapi.h" | ||
#include <stdio.h> | ||
|
||
//指定API进行HOOK,并返回一个进入原函数的代理函数地址。 | ||
void* HookFunction(char* ModuleName,char* FunctionName,void* pNewFunction) | ||
{ | ||
HMODULE hModule = NULL; | ||
UCHAR JumpCode[6] = {0x68,0x00,0x00,0x00,0x00,0xC3}; //push xxxxxxxx ret | ||
UCHAR JumpBackCode[6] = {0x68,0x00,0x00,0x00,0x00,0xC3}; //push xxxxxxxx ret | ||
PVOID pSourceFunction; | ||
char buf[256]; | ||
|
||
hModule = GetModuleHandleA(ModuleName); | ||
if(hModule == NULL) | ||
{ | ||
memset(buf,0,sizeof(buf)); | ||
sprintf(buf,"[HookFunction]GetModuleHandleA(%s) failed",ModuleName); | ||
OutputDebugString(buf); | ||
return NULL; | ||
} | ||
|
||
pSourceFunction = (PVOID)GetProcAddress(hModule,FunctionName); | ||
if (!pSourceFunction) | ||
{ | ||
memset(buf,0,sizeof(buf)); | ||
sprintf(buf,"[HookFunction]GetProcAddress(%s,%s) failed",ModuleName,FunctionName); | ||
OutputDebugString(buf); | ||
return NULL; | ||
} | ||
|
||
*(ULONG *)((ULONG)JumpCode + 1) = (ULONG)pNewFunction; | ||
|
||
|
||
PVOID pProxyFunction = 0; | ||
PUCHAR pOpCode; | ||
ULONG BackupLength = 0; | ||
|
||
|
||
while (BackupLength < 6) | ||
{ | ||
BackupLength += SizeOfCode((PVOID)((ULONG)pSourceFunction + BackupLength),&pOpCode); | ||
} | ||
|
||
|
||
pProxyFunction = VirtualAlloc(NULL,BackupLength + 6,MEM_RESERVE|MEM_COMMIT,PAGE_EXECUTE_READWRITE); | ||
if (!pProxyFunction)return NULL; | ||
|
||
*(ULONG *)((ULONG)JumpBackCode + 1) = (ULONG)pSourceFunction + BackupLength; | ||
|
||
RtlCopyMemory(pProxyFunction,pSourceFunction,BackupLength); | ||
RtlCopyMemory((PVOID)((ULONG)pProxyFunction + BackupLength),JumpBackCode,6); | ||
|
||
FlushInstructionCache((HANDLE)-1,pProxyFunction,BackupLength + 6); | ||
|
||
DWORD OldProtect = 0; | ||
VirtualProtect(pSourceFunction,6,PAGE_EXECUTE_READWRITE,&OldProtect); | ||
|
||
RtlCopyMemory(pSourceFunction,JumpCode,6); | ||
|
||
VirtualProtect(pSourceFunction,6,OldProtect,&OldProtect); | ||
|
||
FlushInstructionCache((HANDLE)-1,pSourceFunction,6); | ||
|
||
return pProxyFunction; | ||
} | ||
|
||
//恢复被HOOK的函数,它需要HookFunction函数返回的代理函数地址作为参数。 | ||
BOOL UnHookFunction(char* ModuleName,char* FunctionName,PVOID pProxyFunction) | ||
{ | ||
PVOID pSourceFunction = (PVOID)GetProcAddress(GetModuleHandleA(ModuleName),FunctionName); | ||
if (!pSourceFunction)return FALSE; | ||
|
||
DWORD OldProtect = 0; | ||
VirtualProtect(pSourceFunction,6,PAGE_EXECUTE_READWRITE,&OldProtect); | ||
|
||
RtlCopyMemory(pSourceFunction,pProxyFunction,6); | ||
|
||
VirtualProtect(pSourceFunction,6,OldProtect,&OldProtect); | ||
|
||
FlushInstructionCache((HANDLE)-1,pSourceFunction,6); | ||
|
||
BOOL res = VirtualFree(pProxyFunction,0,MEM_RELEASE); | ||
if (!res)return FALSE; | ||
|
||
return TRUE; | ||
} | ||
|
||
//检查某个函数是否被HOOK | ||
BOOL IsFuncHooked(char* ModuleName,char* FunctionName) | ||
{ | ||
PVOID pFunction = (PVOID)GetProcAddress(GetModuleHandleA(ModuleName),FunctionName); | ||
|
||
if (!pFunction)return FALSE; | ||
|
||
DWORD OldProtect = 0; | ||
VirtualProtect(pFunction,6,PAGE_EXECUTE_READWRITE,&OldProtect); | ||
|
||
//UCHAR chas = *(UCHAR *)((ULONG)pFunction + 5); | ||
|
||
if (((*(UCHAR *)pFunction == 0x68)&&(*(UCHAR *)((ULONG)pFunction + 5) == 0xC3))||(*(UCHAR *)pFunction == 0xEB)||(*(UCHAR *)pFunction == 0xEA)) | ||
{ | ||
VirtualProtect(pFunction,6,OldProtect,&OldProtect); | ||
return TRUE; | ||
} | ||
else | ||
{ | ||
VirtualProtect(pFunction,6,OldProtect,&OldProtect); | ||
return FALSE; | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
#ifndef __HOOKAPI__H__ | ||
#define __HOOKAPI__H__ | ||
|
||
#include <windows.h> | ||
|
||
#ifdef __cplusplus | ||
extern "C" { | ||
#endif | ||
|
||
//指定API进行HOOK,并返回一个进入原函数的代理函数地址。 | ||
void* HookFunction(char* ModuleName,char* FunctionName,void* pNewFunction); | ||
|
||
//恢复被HOOK的函数,它需要HookFunction函数返回的代理函数地址作为参数。 | ||
BOOL UnHookFunction(char* ModuleName,char* FunctionName,void* pProxyFunction); | ||
|
||
//检查某个函数是否被HOOK | ||
BOOL IsFuncHooked(char* ModuleName,char* FunctionName); | ||
|
||
#ifdef __cplusplus | ||
} | ||
#endif | ||
|
||
#endif |
Oops, something went wrong.