资源列表
VB api0006模拟鼠标单击
- 程序说明: 本例采用API函数实现模拟的鼠标事件,程序运行后会 产生十分有趣的效果。也来试一试。 本例中只使用了相对鼠标坐标,我们也可以使用绝对 鼠标坐标来试一试。-procedures Note : In this example, using API functions simulation of a mouse, running will have a very interesting results. Also to test. In this example,
制作API钩子截获API的例子
- 制作API钩子,截获API的例子-production API hooks, intercepted API examples
MaskKey11
- 屏蔽键盘,利用系统钩子使得可以屏蔽键盘上的按键。-shielding keyboard hook system makes use of shielding the keys on the keyboard.
ScanPass
- 探测密码的VC程序,用全局钩子编写.可以探测出各种密码,限本地使用.-VC password detection procedures used to prepare whole hook. The ability to detect all kinds of passwords, limited local use.
LaunchDLL(数组)
- 主要用于监控IE窗口,能使屏蔽IE的右键,工具栏和菜单的某些操作-mainly used to monitor Internet Explorer window can shield IE right, toolbars and menus of some operations
CutScreen
- 需要先编译动态库hook,然后将hook.dll和hook.lib拷贝到capture的debug目录下-required to compile DLL hook, and then hook.dll hook.lib copied to capture the debug directory
屏幕取词之GetWord-NT-2000
- 屏幕取词中截取文字绘制的部分,截取textoutA,TextOutW,BitBlt,ExtTextOutA,ExtTextOutW。对截取部分处理,并返回符合要求的部分。- The screen takes in the word to intercept the writing plan the part, intercepts textoutA, TextOutW, BitBlt, ExtTextOutA, ExtTextOutW. To intercepts partial proce
屏幕取词之MouseHook
- 屏幕取词中,截获当前鼠标消息的部分。程序根据当前点得到当前窗口的文字。- The screen takes in the word, interception current mouse news part. The procedure basis current spot obtains the current window the writing.
WindowsAPIhook
- Windows系统钩子编程示例,包括鼠标、键盘的系统钩子!-Windows Hook programming examples, including the mouse, keyboard system hook!
GetWord_DLL
- 利用钩子取得屏幕上的字,其中包括金山词霸翻译小帖榜上的字符。-hook made use of the words on the screen, including free email translation small brief list of the characters.
简单聊天工具
- 实现网络中客户端和服务器可以进行简单的通信,类似聊天,一边问候,一边应答-achieve network client and server can perform simple communications, similar to chatting, while greetings side response
keyboard spy
- 这篇文章详细介绍了钩子程序的编写,含源代码,对于写盗取密码监控程序有参考价值.详细可以到www.codeproject.com上去搜索.-This article describes in detail the procedures for the preparation of the hook, with the source code, write steal passwords monitoring program be a valuable reference. Details can