|
| | ExecFileTool (Domain &domain, const std::string &launcher, const std::string &target, const std::string &args, const std::string &directory, bool no_window, bool show_exit_code, bool show_console_out, bool admin, uint64_t session_id, SystemCallMonitor *system_call_monitor, bool all) |
| |
| bool | launch (WindowsEvent &wevent) |
| | Perform the actual injection to launch a process in the guest.
|
| |
| bool | matches_session_id (WindowsEvent &event) const |
| |
| bool | has_user32 (WindowsEvent &event) const |
| |
| bool | matches_launcher (WindowsEvent &event) const |
| |
| void | process_event (Event &event) override |
| | Process an incoming event.
|
| |
| int | result () |
| |
| virtual | ~EventCallback ()=default |
| |
◆ ExecFileTool()
| ExecFileTool::ExecFileTool |
( |
Domain & |
domain, |
|
|
const std::string & |
launcher, |
|
|
const std::string & |
target, |
|
|
const std::string & |
args, |
|
|
const std::string & |
directory, |
|
|
bool |
no_window, |
|
|
bool |
show_exit_code, |
|
|
bool |
show_console_out, |
|
|
bool |
admin, |
|
|
uint64_t |
session_id, |
|
|
SystemCallMonitor * |
system_call_monitor, |
|
|
bool |
all |
|
) |
| |
|
inline |
◆ has_user32()
◆ launch()
Perform the actual injection to launch a process in the guest.
- Examples
- ivexec.cc.
◆ matches_launcher()
| bool ExecFileTool::matches_launcher |
( |
WindowsEvent & |
event | ) |
const |
|
inline |
◆ matches_session_id()
| bool ExecFileTool::matches_session_id |
( |
WindowsEvent & |
event | ) |
const |
|
inline |
◆ process_event()
| void ExecFileTool::process_event |
( |
Event & |
event | ) |
|
|
inlineoverridevirtual |
◆ result()
| int ExecFileTool::result |
( |
| ) |
|
|
inline |
The documentation for this class was generated from the following file:
- /home/runner/work/IntroVirt/IntroVirt/tools/ivexec.cc