Skip to content

Conversation

@Muzzarino
Copy link

@Muzzarino Muzzarino commented Mar 27, 2019

Even though 0x80000000 (the base address) is supported right now, 0x90000000 means it's a pointer address where the asm injective code targets an assembly code stored in a dynamic/randomized address loaded into the pointer.

@TheGag96
Copy link
Owner

Hey man thanks for the PR lol! I'll check this out tomorrow.

@TheGag96
Copy link
Owner

Hmm. I feel as though there needs to be a more robust solution then this. I'm honestly not super sure how I should make it work.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants