搜索资源列表
Dll2Process
- 动态库注入器 1.0 功能:将一个动态库文件注入到一个正在运行的进程内. 应用:通过注入功能,可以实现对一个进程的api hook,比如写一个dll,然后hook socket api,然后注入到你想监视的进程,这样就能够用于网络数据包的分析了 -DLL injector 1.0 features : a dynamic library file is injected into a running process. Applications : by injecting fu
Paladin_demo
- HookAPI is the API SDK that sets up system wide hooks for all windows platforms. It could easily hook 32-bit windows system APIs or 32-bit user-defined DLL. It could be used easily and all you need to do is write a DLL file named mydll.dll or mydll_9
HookImport_src
- Enclosed is MFC source code for a function which can be used to hook any imported function call which your application makes. Since most of the Win32 API is implemented using import functions in dlls, this means that you hook Win32 API calls. This is
XPhook
- 我在XP下用过detour,也是用钩子将dll注入到其他进程进行API拦截,当时拦截的是 ShowWindow以及文件操作的一些API,感觉没什么问题阿.你可以先用Detour拦截一下其他的API试试,比如 CreateProcess,这个API我拦截过,Detour能拦截的 -I used the XP detour. also used to hook dll injected into other processes API interception, then intercept t
NDIA.rar
- API Hook类,已经做成dll文件。其中包含Hook WS2_32.dll 中send 函数的Demo,可以起、轻松修改成其他API 的 Hook.,API Hook type, has made dll file. Hook WS2_32.dll includes send function in the Demo, can be easily modified into other API of Hook.
DLL-IAT-hook
- 屏幕取词功能实现方法2 一个通过修改DLL文件的IAT表来实现的hook开发包源码--Screen Translation Method 2 to achieve a functional DLL file by modifying the IAT table to achieve the hook development kit source code-
apihook_Code
- 一个通过修改DLL文件的IAT表来实现的hook开发包源码-A DLL file by modifying the IAT table to achieve the hook development kit source
socket_hook
- 详细说明利用自己开发的Wsock32.dll文件替换C:\Windows\System32\Wsock32.dll文件,以此实现截包功效!-Detailed descr iption of the use of their own to replace Wsock32.dll file C: \ Windows \ System32 \ Wsock32.dll documents in order to achieve effectiveness cut-off package!
CopyAndMoveFileTest
- API钩子拦截文件读写操作 API钩子拦截文件读写操作 API钩子拦截文件读写操作-API Hook file read and write API Hook file read and write API Hook file read and write API Hook file read and write
apihook
- ApiHooks allows to hook any API in specified process. ----------------------------------------------------- ApiHooks allows inserting module (with hooks) into the specified process. ApiHooks exports EstablishApiHooks functions for usage in your
green
- 运行主程序,然后在要抓包的游戏或者程序里面按小键盘的星号键呼叫。 然后点“开始”,就可以抓包了,点“停止”是停止抓包,回到游戏点“关闭本窗口”, 在在上面的筐筐里面可以写上保存的文件名,一般是TXT文件,要打完整的路径和名字 否则出错,退出前一定要点“释放本窗口”,不然会出错。再有就是有些游戏会无发呼叫本窗口。 本程序源代码BCB 5.0通过。 本程序只钩挂了"send","sendto","recv","recvfrom"这4个函数,WSAsend等不钩挂, 因为是
pe-file
- 对pe文件详细介绍 学HOOK API 时能用上-an intrudution to pe file in detail is useful to hook api
HookAPI
- 推荐一些Windows环境下的HOOK API各种示例源代码,包括网络、注册表、文件、对话筐、进程等各个方面,这是些编程常用到的HOOK示例,可作为资料保存,以备后用。 -To some of the Windows environment HOOK API source code for various examples, including network, registry, file, dialog baskets, and other aspects of the process,
s3filter-high
- 利用API HOOK技术,截获文件读写操作-The use of API HOOK technology, intercepted file read and write operations
APIH00k
- API钩子系统一般框架 通常,我们把拦截API的调用的这个过程称为是安装一个API钩子(API Hook)。一个API钩子基本是由两个模块组成:一个是钩子服务器(Hook Server)模块,一般为EXE的形式;一个是钩子驱动器(Hook Driver)模块,一般为DLL的形式。 钩子服务器主要负责向目标进程注入钩子驱动器,使得钩子驱动器运行在目标进程的地址空间中,这是关键的第一步,而钩子驱动器则负责实际的API拦截处理工作,以便在我们所关心的API函数调用的之前或之后能做一些我们
ZyComHookSample
- IFileOperation COM HOOK代码实例 WIN7系统在explorer.exe中操作文件都是调用IFileOperation COM接口,因此通用方法HOOK Win32 API 如DeleteFile就失去了作用 该实例成功HOOK到了NewItem、RenameItem、RenameItems、MoveItem、MoveItems、CopyItem、CopyItems、DeleteItem、DeleteItems等接口 备注: google您可以找到有关com
hook_keyboard
- 简单的*器,利用HOOK技术,通过API函数SetWindowsHookEx完成的一款*器,可执行文件是控制台编写-Simple keyloggers, use HOOK technology, through the API function SetWindowsHookEx completed a keyboard logger, the executable file is written in the console