mirror of
https://github.com/HIllya51/LunaHook.git
synced 2024-11-30 17:15:38 +08:00
115 lines
2.9 KiB
C++
115 lines
2.9 KiB
C++
#include "CodeX.h"
|
|
|
|
bool CodeXFilter(LPVOID data, size_t *size, HookParam *)
|
|
{
|
|
std::string result = std::string((char *)data, *size);
|
|
strReplace(result, "^n", "\n");
|
|
if (startWith(result, "\n"))
|
|
result = result.substr(1);
|
|
|
|
//|晒[さら]
|
|
result = std::regex_replace(result, std::regex("\\|(.+?)\\[(.+?)\\]"), "$1");
|
|
|
|
return write_string_overwrite(data, size, result);
|
|
}
|
|
|
|
bool InsertCodeXHook()
|
|
{
|
|
|
|
/*
|
|
* Sample games:
|
|
* https://vndb.org/v41664
|
|
* https://vndb.org/v36122
|
|
*/
|
|
const BYTE bytes[] = {
|
|
0x83, 0xC4, 0x08, // add esp,08 << hook here
|
|
0x8D, 0x85, XX4, // lea eax,[ebp-00000218]
|
|
0x50, // push eax
|
|
0x68, XX4, // push ???????????!.exe+10A76C
|
|
0x85, 0xF6, // test esi,esi
|
|
0x74, 0x4F, // je ???????????!.exe+2A95B
|
|
0xFF, 0x15, XX4, // call dword ptr [???????????!.exe+C8140]
|
|
0x8B, 0x85, XX4 // mov eax,[ebp-00000220] << alternative hook here
|
|
};
|
|
|
|
ULONG range = min(processStopAddress - processStartAddress, MAX_REL_ADDR);
|
|
ULONG addr = MemDbg::findBytes(bytes, sizeof(bytes), processStartAddress, processStartAddress + range);
|
|
if (!addr)
|
|
{
|
|
ConsoleOutput("CodeX: pattern not found");
|
|
return false;
|
|
}
|
|
|
|
HookParam hp;
|
|
hp.address = addr;
|
|
hp.offset = get_reg(regs::eax);
|
|
hp.index = 0;
|
|
hp.type = USING_STRING;
|
|
hp.filter_fun = CodeXFilter;
|
|
ConsoleOutput("INSERT CodeX");
|
|
|
|
return NewHook(hp, "CodeX");
|
|
}
|
|
namespace
|
|
{
|
|
bool hook()
|
|
{
|
|
// 霞外籠逗留記
|
|
BYTE _[] = {0x90, 0x90, 0x68, 0x64, 0x7B, 0x4C, 0x00}; // aHdL db 'hd{L',0
|
|
ULONG addr = MemDbg::findBytes(_, sizeof(_), processStartAddress, processStopAddress);
|
|
if (addr == 0)
|
|
return false;
|
|
addr += 2;
|
|
BYTE bytes[] = {0x68, XX4};
|
|
memcpy(bytes + 1, &addr, 4);
|
|
auto addrs = Util::SearchMemory(bytes, sizeof(bytes), PAGE_EXECUTE, processStartAddress, processStopAddress);
|
|
bool succ = false;
|
|
for (auto adr : addrs)
|
|
{
|
|
adr = MemDbg::findEnclosingAlignedFunction(adr);
|
|
if (adr == 0)
|
|
continue;
|
|
HookParam hp;
|
|
hp.address = adr;
|
|
hp.offset = get_stack(1);
|
|
hp.type = CODEC_ANSI_BE;
|
|
succ |= NewHook(hp, "CodeX");
|
|
}
|
|
return succ;
|
|
}
|
|
}
|
|
namespace
|
|
{
|
|
// https://vndb.org/v598
|
|
// ANGEL BULLET
|
|
bool hook2()
|
|
{
|
|
BYTE _[] = {
|
|
0x8b, 0x44, 0x24, 0x04,
|
|
0x81, 0xec, XX4,
|
|
0x25, 0xff, 0xff, 0, 0,
|
|
0x8d, 0x54, 0x24, 0,
|
|
0x56,
|
|
0x8b, 0xf1,
|
|
0x50,
|
|
0x8d, 0x4e, XX,
|
|
0x51,
|
|
0x68, XX4, //%s%03d
|
|
0x52,
|
|
0xff, 0x15, XX4, // wprintfA
|
|
};
|
|
ULONG addr = MemDbg::findBytes(_, sizeof(_), processStartAddress, processStopAddress);
|
|
if (addr == 0)
|
|
return false;
|
|
HookParam hp;
|
|
hp.address = addr;
|
|
hp.offset = get_reg(regs::edx);
|
|
hp.type = USING_STRING;
|
|
hp.filter_fun = CodeXFilter;
|
|
return NewHook(hp, "CodeX");
|
|
}
|
|
}
|
|
bool CodeX::attach_function()
|
|
{
|
|
return InsertCodeXHook() || hook() || hook2();
|
|
} |