diff options
Diffstat (limited to 'legacy')
| -rw-r--r-- | legacy/loader/new 1.txt | 65 |
1 files changed, 47 insertions, 18 deletions
diff --git a/legacy/loader/new 1.txt b/legacy/loader/new 1.txt index 2770ec9..7225056 100644 --- a/legacy/loader/new 1.txt +++ b/legacy/loader/new 1.txt @@ -1,21 +1,50 @@ -login {
- is_valid_login( )
- is_valid_username( )
+SecurityWrapper {
+ Start( ) // Dispatch security thread to periodically check for blacklisted processes.
+ Patch( ) // Bytepatch often abused functions to call ExitProcess directly.
+ Check( ) // Check if dummy functions have been bytepatched (OpenProcess, WriteProcessMemory, VirtualQuery)
}
-inject {
- c_remote_file {
- // we can also replace this with the epic
- // cheat header thing (have loader scan)
- wipe_pe_header
- }
-
- c_remote_load {
- c_remote_load( c_file &in )
- inject( )
- }
-
- c_remote_code {
- make_shellcode
- }
+RemoteCodeParameters {
+ m_dwEndScene
+ m_dwEndSceneOrig
+ //m_dwImportCode
+ m_dwEntryPoint
+ m_dwCheatHeader
+ m_dwVirtualProtect
+}
+
+RemoteCodeServer {
+ Start( RemoteCodeParameters *Parameters )
+ GetBytes( )
+}
+
+RemoteProcess {
+ Start( const char *ProcessName )
+ GetProcess( )
+ Write( )
+ Read( )
+ Allocate( )
+}
+
+RemoteCodeClient {
+ Start( ByteArray &RemoteCode )
+ Dispatch( )
+}
+
+FileReader {
+ Start( const char *FileName )
+ GetBytes( )
+}
+
+RemoteInjectionServer {
+ Start( ByteArray &DllData )
+ ProcessRelocation( uint32_t RemoteAddress )
+ ProcessHeader( RemoteHeader *Header )
+ GetBytes( )
+}
+
+RemoteInjectionClient {
+ Start( RemoteProcess &Process )
+ AllocateMap( uint32_t SizeOfImage )
+ WriteToMap( ByteArray &Data )
}
\ No newline at end of file |
