Skip to content
This repository has been archived by the owner on Dec 4, 2024. It is now read-only.

Commit

Permalink
new readme
Browse files Browse the repository at this point in the history
  • Loading branch information
4ra1n committed Sep 14, 2023
1 parent ae5285e commit 4242080
Show file tree
Hide file tree
Showing 3 changed files with 14 additions and 6 deletions.
10 changes: 7 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,13 @@

我参考 `Beichen` 师傅议题的思路,从 `JVM` 里禁用了 `gHotSpotVMStructs` 函数

![](img/008.png)
支持 `Windows` 系统

![WINDOWS](img/008.png)

支持 `Linux` 系统

![LINUX](img/009.png)

## 快速开始

Expand Down Expand Up @@ -95,8 +101,6 @@ java -XX:+DisableAttachMechanism -agentpath:D:\abs-path\decrypter.dll=PACKAGE_NA

不适用于启动扫描 `class` 的项目

防止 `sa-jdi` 的思路仅在 `windows` 中测试

## 参考

特别感谢 `BeichenDream` 师傅
Expand Down
10 changes: 7 additions & 3 deletions doc/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,13 @@ Some hackers may found `sa-jdi` and `HSDB` to `dump` byte code.

Refer to `Beichen` articles, prevent `gHotSpotVMStructs` function of `JVM`.

![](../img/008.png)
Support Windows:

![WINDOWS](../img/008.png)

Support Linux:

![LINUX](../img/009.png)

## Quick Start

Expand Down Expand Up @@ -94,8 +100,6 @@ The `native` directory is built using `cmake`, generating `dll` and `so` files t

This approach is not suitable for scanning projects that involve launching the scanning of `class` files.

The prevention strategy using `sa-jdi` is only tested on `Windows`.

## Refer

Thanks to `BeichenDream`
Expand Down
Binary file added img/009.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit 4242080

Please sign in to comment.