From a5acd4c9a3b24c9d5af3a8f504e5af053fa7fa09 Mon Sep 17 00:00:00 2001 From: boris Date: Thu, 20 Dec 2018 21:38:04 +1300 Subject: yo is this loss --- csgo-loader/csgo-client/Security/SyscallManager.hpp | 15 ++++++++++----- 1 file changed, 10 insertions(+), 5 deletions(-) (limited to 'csgo-loader/csgo-client/Security/SyscallManager.hpp') diff --git a/csgo-loader/csgo-client/Security/SyscallManager.hpp b/csgo-loader/csgo-client/Security/SyscallManager.hpp index e154625..a9c67aa 100644 --- a/csgo-loader/csgo-client/Security/SyscallManager.hpp +++ b/csgo-loader/csgo-client/Security/SyscallManager.hpp @@ -11,9 +11,11 @@ using ByteArray = std::vector; -namespace Wrapper { +namespace Wrapper +{ // A stub used for our syscalls. - class SyscallStub { + class SyscallStub + { // The shellcode which executes a low latency system call. uint8_t m_Shellcode[11] = { 0x4C, 0x8B, 0xD1, // mov r10, rcx @@ -28,14 +30,16 @@ namespace Wrapper { // Sets the syscall index. void SetIndex(uint32_t Index); - __forceinline uintptr_t Get() { + __forceinline uintptr_t Get() + { return (uintptr_t)m_Shellcode; } }; // Manager for system calls. Used to iterate NTDLL for all syscall indices. // Read: https://www.evilsocket.net/2014/02/11/on-windows-syscall-mechanism-and-syscall-numbers-extraction-methods/ - class SyscallManager { + class SyscallManager + { // Reading NTDLL from disk because it cannot be modified // due to restrictions put in place by PatchGuard. ByteArray GetNtdllFromDisk(); @@ -54,7 +58,8 @@ namespace Wrapper { // Finds a syscall by hash. template < typename T > - T Find(uint64_t Hash) { + T Find(uint64_t Hash) + { return (T)m_Syscalls[Hash].Get(); } }; -- cgit v1.2.3