搜索资源列表
dllin_e
- 易语言注入DLL并且调用的源码 包括已经编译好的DLL exe 和源码!-Easy language to inject a DLL and call the source Including already compiled DLL exe and source code!
PEHook
- 通过修改exe达到注入DLL的功能,然后调用DLL的某个函数。-modify exe to inject dll, and then call the dll function.
gfhfgh
- dll拦截发送封包源码注入器程序易语言线程注入方式应用程序大家看看啊-Injector program easy language threads into the application we look at
RemoteThreadMateQQ
- QQ远程监控源码,通过DLL远程注入。窗口子类化、钩子等技术实现QQ聊天记录,密码等监控。申明:本程序仅用于技术研究。禁止用于非法行为。-QQ RMON source, through the DLL a remote injection. Window subclassing, hooks and other technologies to achieve the QQ chat records, passwords, and other monitoring. Disclaimer: Thi
WS2HELP
- DLL劫持WS2HELP实现注入(源码) 转载别人的,参考学习使用! -DLL hijacking WS2HELP injection (source) the reprint of others, learning to use!
InjLib
- 代码功能:将动态链接库注入已运行的进程 用途: 用于拦截API测试。 程序用于开发api拦截功能的辅助测试用,当开发了一个api拦截应用的时候,需要频繁的注入,卸载于某进程。 本工具可以使得工作更为方便的进行,如可直接启动notepad进程并注入指定的动态链接库(此dll名称写死于代码内 ,但可以很容易的修改成可配置的方式,不过一般没有必要),当然,也可指定进程id来注入 当年做加密保护的时候,API拦截的部分经常需要做此种测试,故有此工具诞生了。 原理:用远程线程方式注
InjLib
- 使用CreateRemoteThread函数来注入D-To use CreateRemoteThread function is to inject a DLL
IAT
- IAT注入,可自动读取PE文件添加自己的DLL函数命令 模块非自己编写 但经过本人优化,和BUG修正-IAT injection, can be read automatically add the DLL function command module own non write but after I optimization, PE files and BUG correction
hooksr
- 这是一个dll工程。通过注入到其他进程能捕获到进程的网络收发数据。(所用技术:IAT HOOK,能截取send()、recv()等网络收发函数)-This is a dll project which can capture the data from send(),recv() and so on.
delphi-keyboard-hook-source
- delphi歪瓜钩子注入例子键盘钩子delphi7源码。包含dll和exe部分。-delphi crooked melon hook into the keyboard hook example delphi7 source. Dll and exe contains part.
Inject_Dll_Demo_src
- Delphi 实现,向进程动态注入 DLL。主要通过win32api的远程调用来实现注入,可选多种不同实现方式,可以注入大部分进程。-Delphi implementation, the process of dynamically injected DLL. Mainly through remote call win32api to achieve injected optional in many different implementations, most of the process
WSPHOOK
- 利用WSPHOOK拦截封包数据 钩子注入D-Use WSPHOOK intercept data packets Hook DLL injection
APIHOOK
- 利用APIHOOK拦截封包数据 钩子注入D-Use APIHOOK hook into DLL to intercept data packets
Enumeration-socket
- 利用WSPHOOK枚举套接字信息 钩子注入D-Use WSPHOOK enumerate information socket hook DLL injection
InjectLibrary64
- WIN7 64位下 32位注入64位DLL程序-WIN7 64 bit The following 32 64 DLL injection procedure
CodeInject
- 代码注入例子,有DLL和例子的代码 代码完整可运行-Code injection example, there are DLL and examples of code
[6-1]RemoteThreadToSystemProcess
- 在RING3环境下完成注入DLL到系统进程,实现破解session隔离机制-Done under RING3 environment to system process DLL injection, to achieve break session isolation mechanism
InjectCreateProcess
- 利用CreateProcess挂起启动一个程序并注入dll文件。-Use CreateProcess to start a program and inject the DLL file.
remoteinject
- dll远程注入,Hook 拦截消息和api,测试成功,修改期望拦截的api就可以了-dll remote injection, Hook intercept messages and api, test, modify the desired intercept api it
Golab
- 易语言辅助全家注入d-Easy language family assisted injection dll. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .