mirror of
https://github.com/takeshixx/redstar-tools
synced 2025-07-17 20:43:21 +00:00
Additional files added
This commit is contained in:
@ -1,2 +1,3 @@
|
|||||||
# redstar-tools
|
# Tools for Red Star OS (붉은별)
|
||||||
Tools for Red Star OS (붉은별)
|
|
||||||
|
This repository includes several binaries from and tools for Red Star OS. These can be used for further research work.
|
||||||
|
7
bin/README.md
Normal file
7
bin/README.md
Normal file
@ -0,0 +1,7 @@
|
|||||||
|
## opprc
|
||||||
|
|
||||||
|
The service which is responsible for watermarking media files.
|
||||||
|
|
||||||
|
## scnprc
|
||||||
|
|
||||||
|
A "virus scanner" that deletes malicious files.
|
BIN
bin/scnprc
Executable file
BIN
bin/scnprc
Executable file
Binary file not shown.
@ -1,11 +1,13 @@
|
|||||||
# libos
|
# libos
|
||||||
|
|
||||||
## Compile
|
`libos.so.0.0.0` is the original libos file from Red Star OS 3.0 Desktop.
|
||||||
|
|
||||||
|
## Compile custom libos
|
||||||
|
|
||||||
1. gcc -c -Wall -Werror -fpic libos.c
|
1. gcc -c -Wall -Werror -fpic libos.c
|
||||||
2. gcc -shared -o libos.so.0.0.0 libos.o
|
2. gcc -shared -o libos.so.0.0.0 libos.o
|
||||||
|
|
||||||
## Install
|
## Install custom libos
|
||||||
|
|
||||||
1. Move new libos.so.0.0.0 to /usr/lib/libos.so.0.0.0
|
1. Move new libos.so.0.0.0 to /usr/lib/libos.so.0.0.0
|
||||||
2. Link /usr/lib/libos.so.0.0.0 to /usr/lib/libos.so.0
|
2. Link /usr/lib/libos.so.0.0.0 to /usr/lib/libos.so.0
|
||||||
|
BIN
libos/libos.so.0.0.0
Executable file
BIN
libos/libos.so.0.0.0
Executable file
Binary file not shown.
BIN
patterns/AnGae.dat
Normal file
BIN
patterns/AnGae.dat
Normal file
Binary file not shown.
11
patterns/README.md
Normal file
11
patterns/README.md
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
## AnGae.dat
|
||||||
|
|
||||||
|
The pattern file from Red Star OS 3.0 Desktop.
|
||||||
|
|
||||||
|
## angae-010.template
|
||||||
|
|
||||||
|
A file structure template for the 010 Editor.
|
||||||
|
|
||||||
|
## parse.py
|
||||||
|
|
||||||
|
Basic parsing of AnGae.dat files.
|
41
patterns/parse.py
Executable file
41
patterns/parse.py
Executable file
@ -0,0 +1,41 @@
|
|||||||
|
#!/usr/bin/env python2
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
import sys
|
||||||
|
import struct
|
||||||
|
|
||||||
|
f = open(sys.argv[1])
|
||||||
|
|
||||||
|
timestamp, = struct.unpack('<I', f.read(4))
|
||||||
|
|
||||||
|
unknown1 = f.read(1000)
|
||||||
|
|
||||||
|
package_id, = struct.unpack('<I', f.read(4))
|
||||||
|
unknown2, = struct.unpack('<I', f.read(4))
|
||||||
|
pattern_date, = struct.unpack('<I', f.read(4))
|
||||||
|
file_count, = struct.unpack('<I', f.read(4))
|
||||||
|
head_pos, = struct.unpack('<I', f.read(4))
|
||||||
|
real_size, = struct.unpack('<I', f.read(4))
|
||||||
|
|
||||||
|
pattern_count, = struct.unpack('<Q', f.read(8))
|
||||||
|
|
||||||
|
print('timestamp: {}'.format(timestamp))
|
||||||
|
print('pattern count: {}'.format(pattern_count))
|
||||||
|
|
||||||
|
patterns = []
|
||||||
|
|
||||||
|
for i in range(pattern_count):
|
||||||
|
pattern = dict()
|
||||||
|
pattern['reclen'], = struct.unpack('<I', f.read(4))
|
||||||
|
|
||||||
|
if int(pattern['reclen']) is not 200:
|
||||||
|
print(pattern['reclen'])
|
||||||
|
break
|
||||||
|
|
||||||
|
pattern['package_id'], = struct.unpack('<I', f.read(4))
|
||||||
|
pattern['content'], = struct.unpack('<200s', f.read(200))
|
||||||
|
patterns.append(pattern)
|
||||||
|
|
||||||
|
pattern_checksum, = struct.unpack('<20s', f.read(20))
|
||||||
|
print('pattern checksum: {}'.format(pattern_checksum.encode('hex')))
|
||||||
|
|
||||||
|
#print(patterns)
|
@ -1,6 +1,6 @@
|
|||||||
# Interact with `rtscan`
|
# Interact with `rtscan`
|
||||||
|
|
||||||
`resctl.py` can be used to interact with `rtscan` kernel module via ioctl calls to `/dev/res`.
|
`resctl.py` can be used to interact with `rtscan` kernel module via ioctl calls to `/dev/res`. `rtscan.ko` is the original kernel module from Red Star OS 3.0 Desktop.
|
||||||
|
|
||||||
*Note*: On Red Star 3.0 this needs to be executed with root privileges.
|
*Note*: On Red Star 3.0 this needs to be executed with root privileges.
|
||||||
|
|
||||||
|
BIN
rtscan/rtscan.ko
Executable file
BIN
rtscan/rtscan.ko
Executable file
Binary file not shown.
Reference in New Issue
Block a user