Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

XBDM hack corrupts xboxkrnl.exe #14

Open
JayFoxRox opened this issue Jul 1, 2018 · 0 comments
Open

XBDM hack corrupts xboxkrnl.exe #14

JayFoxRox opened this issue Jul 1, 2018 · 0 comments

Comments

@JayFoxRox
Copy link
Member

Our call command from #12 uses the xboxkrnl.exe header at 0x80010000. We should instead improve the assembly to use code-relative addressing. The easiest is probably by writing a pointer to the communication space to the code and just loading the pointer from that. Alternatively, the old call f; f: pop eax trick.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant