An example of dynamically finding variable location at runtime based on the module base address of the host process and a predetermined offset found through debugging. The memory_edit_target.cpp file is the code for the victim process. The memory_edit_actor.cpp is the process that performs the memory read/edit. The offset may need to be updated for each newly compiled target binary.
-
Notifications
You must be signed in to change notification settings - Fork 0
An example of dynamically finding variable location at runtime based on the module base address of the host process and a predetermined offset found through debugging. The memory_edit_target.cpp file is the code for the victim process. The memory_edit_actor.cpp is the process that performs the memory read/edit. The offset may need to be updated …
harrisoncbrammell/dynamic-memory-access-POC
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
An example of dynamically finding variable location at runtime based on the module base address of the host process and a predetermined offset found through debugging. The memory_edit_target.cpp file is the code for the victim process. The memory_edit_actor.cpp is the process that performs the memory read/edit. The offset may need to be updated …
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published