搜索资源列表
HookImport_src
- Enclosed is MFC source code for a function which can be used to hook any imported function call which your application makes. Since most of the Win32 API is implemented using import functions in dlls, this means that you hook Win32 API calls. This is
hookyou_1
- 本文(其实是随笔)和实例代码描述的内容主要包括:API拦截,消息钩子,枚举子窗体,注册系统热键。其中消息钩子、API拦截、枚举子窗体实现代码在dll中,注册系统热键代码实现在测试exe中,另外exe代码段还涉及自定义消息和系统栏图标。希望对你有用-paper (actually essay) and example code descr iption of the contents include : API interception, news hook, except for the for
zhuru.dll注入的源代码
- 一个dll注入的源代码,通过找窗口句柄,HOOK,热键呼出封装在dll中的窗体,A dll into the source code through to find window handle, HOOK, exhaled hotkey is packaged in a form in dll
jianpangouzi
- 一个自己编写的键盘钩子程序,用DLL的形式封装-I have written a keyboard hook procedure, use the form of DLL package
HOOK_DLL
- 一个带窗体的DLL注入到游戏中示例源码。 HOOK_DLL!-One with a form of DLL is injected into the game in the sample source code.
Call--form-in-DLL-into-MDI-form-
- 窗体调用DLL中的窗体让其变成MDI窗体 窗体调用DLL中的窗体让其变成MDI窗体-Call the form in the DLL into a MDI form Call the form in the DLL into a MDI form
APIH00k
- API钩子系统一般框架 通常,我们把拦截API的调用的这个过程称为是安装一个API钩子(API Hook)。一个API钩子基本是由两个模块组成:一个是钩子服务器(Hook Server)模块,一般为EXE的形式;一个是钩子驱动器(Hook Driver)模块,一般为DLL的形式。 钩子服务器主要负责向目标进程注入钩子驱动器,使得钩子驱动器运行在目标进程的地址空间中,这是关键的第一步,而钩子驱动器则负责实际的API拦截处理工作,以便在我们所关心的API函数调用的之前或之后能做一些我们
dll
- dll注入,根据设置的进程名称,进行dll注入。进程名称和dll地址都写在代码里边,展示界面为dos窗体。已经在win7,xp下进行过测试,没问题。希望可以给需要使用者提供些帮助和思路-dll injection, according to the process name settings, perform dll injection. Dll process name and address are written in code inside, display interface to d
