Update for using with server emulator
This commit is contained in:
parent
94afd6f36e
commit
03225afd01
1 changed files with 37 additions and 1 deletions
38
src/lib.rs
38
src/lib.rs
|
@ -3,7 +3,7 @@ use std::time::Duration;
|
|||
|
||||
use ilhook::x64::Registers;
|
||||
use interceptor::Interceptor;
|
||||
use windows::core::{PCSTR, PCWSTR};
|
||||
use windows::core::{s, w, PCSTR, PCWSTR};
|
||||
use windows::Win32::System::Console;
|
||||
use windows::Win32::System::SystemServices::DLL_PROCESS_ATTACH;
|
||||
use windows::Win32::{Foundation::HINSTANCE, System::LibraryLoader::GetModuleHandleA};
|
||||
|
@ -11,6 +11,7 @@ use windows::Win32::{Foundation::HINSTANCE, System::LibraryLoader::GetModuleHand
|
|||
mod interceptor;
|
||||
|
||||
const FPAKFILE_CHECK: usize = 0x3D2F460;
|
||||
const KUROHTTP_GET: usize = 0xFC8CF0;
|
||||
|
||||
unsafe fn thread_func() {
|
||||
Console::AllocConsole().unwrap();
|
||||
|
@ -28,10 +29,41 @@ unsafe fn thread_func() {
|
|||
)
|
||||
.unwrap();
|
||||
|
||||
interceptor
|
||||
.attach((module.0 as usize) + KUROHTTP_GET, on_kurohttp_get)
|
||||
.unwrap();
|
||||
|
||||
let krsdk_ex = loop {
|
||||
match GetModuleHandleA(s!("KRSDKEx.dll")) {
|
||||
Ok(handle) => break handle,
|
||||
Err(_) => thread::sleep(Duration::from_millis(1)),
|
||||
}
|
||||
};
|
||||
|
||||
interceptor
|
||||
.replace((krsdk_ex.0 as usize) + 0x4A690, dummy)
|
||||
.unwrap();
|
||||
|
||||
interceptor
|
||||
.replace((krsdk_ex.0 as usize) + 0x8BB80, dummy)
|
||||
.unwrap();
|
||||
|
||||
println!("Successfully initialized!");
|
||||
thread::sleep(Duration::from_secs(u64::MAX));
|
||||
}
|
||||
|
||||
unsafe extern "win64" fn on_kurohttp_get(reg: *mut Registers, _: usize) {
|
||||
let wstr = *((*reg).rcx as *const usize) as *mut u16;
|
||||
let url = PCWSTR::from_raw(wstr).to_string().unwrap();
|
||||
|
||||
println!("HTTP GET: {url}");
|
||||
if url.ends_with("/index.json") {
|
||||
println!("index.json requested, redirecting");
|
||||
let new_wstr = w!("http://127.0.0.1:10001/index.json");
|
||||
std::ptr::copy_nonoverlapping(new_wstr.as_ptr(), wstr, new_wstr.as_wide().len() + 2);
|
||||
}
|
||||
}
|
||||
|
||||
unsafe extern "win64" fn fpakfile_check_replacement(
|
||||
reg: *mut Registers,
|
||||
_: usize,
|
||||
|
@ -44,6 +76,10 @@ unsafe extern "win64" fn fpakfile_check_replacement(
|
|||
1
|
||||
}
|
||||
|
||||
unsafe extern "win64" fn dummy(_: *mut Registers, _: usize, _: usize) -> usize {
|
||||
1
|
||||
}
|
||||
|
||||
#[no_mangle]
|
||||
unsafe extern "system" fn DllMain(_: HINSTANCE, call_reason: u32, _: *mut ()) -> bool {
|
||||
if call_reason == DLL_PROCESS_ATTACH {
|
||||
|
|
Loading…
Reference in a new issue