qb-0 / pyMeow

Python Game Hacking Library
MIT License
355 stars 39 forks source link

Winonly -> create_remote_thread, inject_module, get_proc_address (undocumented inject_shellcode) #44

Closed Hypnootika closed 7 months ago

Hypnootika commented 7 months ago

Added and tested above functions. inject_module and get_proc_address are 100% working. create_remote_thread is destroying my brain at the moment. I THINK it is working correctly.

qb-0 commented 7 months ago

thank you

Hypnootika commented 7 months ago

thank you

  • please use result.base = getModule(result, result.name).base for the base address of the process
  • remove the # Winonly comments in the cheatsheet - we didn't do that on other windows functions also
  • is processWrite necessary or / and could it be simplified?
  • is archMatch necessary? Could it be simplified with reusing is64bit?
  1. As already explained in DC -> i needed to use enumModules because of the pyObject
  2. Will do
  3. No as explained in DC: Just for the Windows seperation
  4. No as explained in DC: Just for the Windows seperation
Hypnootika commented 7 months ago
  1. Fixed
  2. Fixed
  3. Fixed
  4. Fixed