Results 11 comments of Inusha

For windows: Write your own `list_modules` function to returns a dictionary of module name to modBaseAddr https://github.com/n1nj4sec/memorpy/blob/master/memorpy/WinProcess.py#L268 The base address of a process `process.exe` would be the `"process.exe"` entry of...

Check https://github.com/hrt/memorpy for an example

Which ones can you not find? My process of finding offsets include: 1. using signatures of offsets from previous patches to find them in the current patch (I used free...

@bufdex If you've correctly found your local entity pointer and for some reason you're not seeing it in the entity list like above then you could just wrap it in...

Yes, if you are hooking functions you should also [hook all iframes](https://github.com/hrt/WheelChair/blob/master/loader/manifest.json#L8). Fun fact: Krunker started doing this after I introduced the use of it in above repo.

> This is hackable by Object.defineProperty + Proxy. @redscheme I would like to see an example user script that hooks `Array.prototype.join` in anyway and gets the pass on https://hrt.github.io/TamperDetectJS/ with...

@redscheme this means that it wouldn't be hooking `join`. All krunker or whoever would do is store`join` in a variable, do whatever checks (which you haven't hooked to get passed...

@doctor8296 Good one. You've beaten it. If I were to make it harder, I'd first make the checks on the stack traces a little stronger (`Proxy` is seen everywhere) 😂...

@doctor8296 Not sure I understood that. --- I likely read your comment wrong but I should also add `delete Function.prototype.something` where `something` can be a lot of prototype functions for...

@doctor8296 not necessarily: ![image](https://github.com/hrt/TamperDetectJS/assets/21159953/5f17c8cc-5672-461b-b176-a14cb0360df9)