forked from WangChongwen-me/Android-Protection-Bypass-Stuff
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathstalker.js
More file actions
60 lines (54 loc) · 1.81 KB
/
stalker.js
File metadata and controls
60 lines (54 loc) · 1.81 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
// not tested
var table = { /* syscall table here */ }
var arch = Process.arch;
var syscallNumberRegister;
if (arch === 'x64') {
syscallNumberRegister = 'rax';
} else if (arch === 'x32') {
syscallNumberRegister = 'eax';
} else if (arch === 'arm64') {
syscallNumberRegister = 'x8';
} else if (arch === 'arm') {
syscallNumberRegister = 'r7';
} else {
throw new Error('Unsupported architecture: ' + arch);
}
function isSyscall(instruction) {
if (arch === 'x64' || arch === 'x32') {
return instruction.mnemonic === 'syscall' || instruction.mnemonic === 'int' && instruction.operands[0].value === 0x80;
} else if (arch === 'arm64') {
return instruction.mnemonic === 'svc' && instruction.operands[0].value === 0;
} else if (arch === 'arm') {
return instruction.mnemonic === 'svc' && instruction.operands[0].value === 0x00000000;
}
return false;
}
function stalk(threadId) {
Stalker.follow(threadId, {
events: {
call: false,
ret: false,
exec: true,
},
onReceive: function (events) {
var iterator = new Stalker.EventIterator(events);
while (iterator.next() !== null) {
var instruction = iterator.decode();
if (isSyscall(instruction)) {
var context = iterator.ctx;
var sc = parseInt(context[syscallNumberRegister]);
var syscallName = table[sc] || 'UNKNOWN';
console.log('Entering syscall', syscallName, context);
}
}
},
});
}
// Main thread
stalk(Process.getCurrentThreadId());
// All other threads
Process.enumerateThreadsSync().forEach(function (thread) {
if (thread.id !== Process.getCurrentThreadId()) {
stalk(thread.id);
}
});