搜索资源列表
Hooking_the_kernel_directly
- 直接内核钩子。教你如何用C写内核函数钩子。文件里面包含了详细文档和代码。-direct kernel hook. Teach you how to write C kernel function hook. File includes detailed documentation and code.
ProcessManager
- Process Manager [DKOM(Direct Kernel Object Manipulation) windows service pack 2
GHookAPI_ALL.rar
- 一个很实用的已经封装好的hookapi库,可供大家直接拿去使用,或者学习,Has a very practical package, good hookapi library, for all direct chunks, or learning
kernel_Global.rar
- 使用direct技术,能过NP,包括QQ的密码保护,拦截一切键盘输入的好工具,全局钩子,代码很少,不超过250行,没DLL直接实现的,Direct the use of technology, can lead NP, including QQ password protection, to intercept all keyboard input of a good tool, global hook, code small, not more than 250 lines, no DLL d
Inline-Hook_NtOpenProcess
- 一段INLINE-HOOK的代码,以及一个循环检测是否改写,可在直接调用。【给HookOn传入一个PID即可】。-INLINE-HOOK section of the code, as well as a cycle of test re-evaluated, in direct call. 【HookOn into a PID to be】.
DirectXHook_demo
- Simple Direct X hook
HooklibEx
- 直接多线程调用的R3hook,恢复代码调用采用ADE的反汇编,非常稳定-Direct multi-threaded calls R3hook, called the use of ADE recovery code disassembler, very stable
InnerHook
- 鼠标键盘消息钩子示例程序,程序内部直接调用实现,不是通过动态链接-Keyboard mouse hook message, direct the realization of the internal procedures
pc
- Wincap 以太网抓包源代码 在 vc6.0下直接运行 -Ethernet Wincap capture the source code to run in direct vc6.0
Prevent_Loadhook
- 阻止全局钩子的加载.使用了微软的Detours库进行API拦截。如果只是为了拦截一个函数,使用Detours好像有点儿浪费。本程序不使用Detours库,直接对LoadLibraryExW函数进行拦截。-Hook to prevent the loading of the overall situation. The use of Microsoft' s Detours library to intercept API. If only in order to intercept a f
hooke-jeeves
- 优化算法中直接搜索法,Hooke-Jeeves算法-Direct search optimization method, Hooke-Jeeves Algorithm
SIG2_DefeatingNativeAPIHookers
- Defeating Kernel Native API Hookers by Direct Service Dispatch Table Restoration
hookmodel
- 这是全局hook封装的,直接调用, -This is a global hook package, direct call
InjLib
- 代码功能:将动态链接库注入已运行的进程 用途: 用于拦截API测试。 程序用于开发api拦截功能的辅助测试用,当开发了一个api拦截应用的时候,需要频繁的注入,卸载于某进程。 本工具可以使得工作更为方便的进行,如可直接启动notepad进程并注入指定的动态链接库(此dll名称写死于代码内 ,但可以很容易的修改成可配置的方式,不过一般没有必要),当然,也可指定进程id来注入 当年做加密保护的时候,API拦截的部分经常需要做此种测试,故有此工具诞生了。 原理:用远程线程方式注
TEXT_-Getword
- 用VB写的可以直接读取鼠标所在位置的单词,以及那一行的全部文本-Direct reading of the mouse location of VB can be used to write the words, and that for all text
TCP_Forward-v1.1
- gid源码。使用画板超级方便,直接绘画各种各种方便-Gid source code. Using tablets super convenient, direct painting all sorts of all sorts of convenient