搜索资源列表
利用HOOK拦截封包原理
- HOOK封包原理-HOOK packet Principle
Api Hook和封包拦截技术
- const WM_UNSUBCLASS = WM_USER + 2001 //卸载子类化消息 WM_SENDDATA = WM_USER + 2003 //收到要发送新数据包的消息 type PMyDLLVar = ^TMyDLLVar //用来共享的内存数据结构 TMyDLLVar = record SubClass: Boolean //是否已经子类化 HookWindow, SpyWindow: LongWORD //要安装HOOK的窗口及用于接收消息的窗口 hHook: LongWORD
HOOK SEND RECV函数拦截网络封包的程序
- 一个HOOK SEND RECV函数拦截网络封包的程序!,HOOK SEND RECV a function of the program to intercept network packets!
HOOK.rar
- CALL 函数```明文发包`````````````````学封包的``可以学习下,CALL function `` `contract expressly ````````````````` learning packet `` can learn under
InlineHook
- 用全局钩子注入,用5字节跳转HOOK了封包发送接收的几个函数-With the overall hook implantation, with 5 bytes of the packet sent Jump HOOK received several function
76328_Sniff
- 用hook方式~!擷取軟體的傳送和接收的封包~!-With hook way ~! Picks up the software the transmission and receive wrapped gift ~!
Core
- 用hook方式~!擷取軟體的傳送和接收的封包~!-With hook way ~! Picks up the software the transmission and receive wrapped gift ~!
Pack_Hook_Strong
- Hook方式获取指定进程的网络封包,经过本人修改,功能十分强大, 可以获取任意程序封包-Hook obtain the specified process network packets
HookEXE
- 诛仙Hook,截取封包HooK源码-Zhu Xian Hook, intercepts the packet
封包截取的VC源码
- 封包截取的VC源码,采用HOOK的方式 利用API的替换功能,获取其他程序的消息信息
hook
- delphi hook目标程序,send/recv 封包-delphi hook target program, send/recv packet
WSPHOOK
- 利用WSPHOOK拦截封包数据 钩子注入D-Use WSPHOOK intercept data packets Hook DLL injection
APIHOOK
- 利用APIHOOK拦截封包数据 钩子注入D-Use APIHOOK hook into DLL to intercept data packets
HookDll
- // NtDeviceIoControlFile的HOOK函数 // ws2_32.dll的send , recv最终会调用到mswsock.dll内的数据发送函数 // mswsock.dll会调用NtDeviceIoControlFile向TDI Client驱动发送Send Recv指令 // 我们在这里做拦截,可以过滤所有的TCP 收发包(UDP之类亦可,不过要更改指令) // Hook mswsock.dll导出表的Ntdll!NtDeviceIoControlFile