GithubHelp home page GithubHelp logo

pshocker / android_hook_sf_draw_arm64 Goto Github PK

View Code? Open in Web Editor NEW
25.0 25.0 13.0 69 KB

hook surfaceflinger进程的eglSwapBuffers方式实现绘制,适用arm64 root下的安卓真机

Makefile 1.18% C 36.43% C++ 62.40%

android_hook_sf_draw_arm64's People

Contributors

pshocker avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar

android_hook_sf_draw_arm64's Issues

pixel4、android11、arm64-v8a hook不成功

直接下载按照文档编译,执行inject后立即退出了程序,界面没有绘制
日志如下:
07-02 18:31:14.804 16855 16855 W INJECT : [+] Injecting process: 641
07-02 18:31:14.807 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.807 16855 16855 W INJECT : [+] Remote mmap address: 77937fb410
07-02 18:31:14.807 16855 16855 W INJECT : [+] Calling mmap in target process.
07-02 18:31:14.807 16855 16855 W INJECT : [+] Target process returned from mmap, return value=0, pc=77937fb410
07-02 18:31:14.809 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.813 16855 16855 I chatty : uid=0(root) ./inject identical 2 lines
07-02 18:31:14.815 16855 16855 W INJECT : [+] get_remote_addr: local[0], remote[0]
07-02 18:31:14.815 16855 16855 W INJECT : [+] Get imports: dlopen: 7793605014, dlsym: 7793605040, dlclose: 7793605084, dlerror: 779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlopen in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlopen, return value=0, pc=7793605014
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlerror in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlerror, return value=0, pc=779360502c
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling dlsym in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from dlsym, return value=0, pc=7793605040
07-02 18:31:14.815 16855 16855 W INJECT : hook_entry_addr666 = 0x0
07-02 18:31:14.815 16855 16855 W INJECT : [+] Calling hook_entry in target process.
07-02 18:31:14.815 16855 16855 W INJECT : [+] Target process returned from hook_entry, return value=200, pc=0

这个hook_entry的地址是不是有问题?

在什么系统下做的编译?

ndk-build,没有命令,找不到。
这个项目是在什么环境下编译的呢,ubt?需要配置ndk什么版本的环境?
如果有时间,可以告知下,感谢了

Gnu lookup error

gnuLookup: not found symbol eglSwapBuffers in /system/lib64/libsurfaceflinger.so

Android: 11

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.