搜索资源列表
ExcpHookMonitor_0.0.4
- ExcpHook is an open source (see license.txt) Exception Monitor for Windows made by Gynvael Coldwind (of Team Vexillium). t uses a ring0 driver to hook KiExceptionDispatch procedure to detect the exceptions, and then shows information about the except
hookkeylog
- 全局钩子,监视所有键盘消息,并且保存到文本文件.详细全面的过程.全部源代码.VC6下编译通过-overall hook, keyboard monitor all news and save text files. Detailed and comprehensive process. All source code. Under compile VC6
InsertThread
- 利用Hook在Explorer进程插入一个线程实例-use Explorer Hook in the process of inserting a threaded example
完整的发声程序
- 用钩子实现捕获键盘后发出字母声音,完整的发声程序-achieve caught with hook keyboard letters issued after the voices audible integrity of the process
APIHookingRevisited_src
- There are numerous codes in the www to explain how to hook API functions inside a remote process. So, why creating another one ? This article is the first (I) part of a tool I m working on. This tools won t be too complex, so there is no need for a h
gamehook
- 使用vs.net,c#开发的外挂程序, 利用全局键盘钩子激活外挂, 通过进程内存读写技术,实现扫雷和连连看3的外挂功能。-use vs.net, c # development of the external procedure, and use the keyboard hook overall external activation, through the process of reading and writing memory technology, and the 1000 bloc
勾子编程指南
- win32抛弃了win16的全局内存的概念,每个进程有自己独立的内存空间, 并且不受其他进程影响.这样一来所有代码都只能访问局部资源,但很显然有些 应用必须是全局的,比如你的hook,所以ms必须提供一种折衷的安全的方法.好 在windows中的dll正好可以解决这个问题.-win32 was abandoned on the overall situation of the concept of memory, each process has its own memory space, an
GetWord.rar
- 屏幕取词,利用windows的钩子函数进行进程注入,可获得鼠标所在位置的单词。,Screen, use the hook function windows process can get the mouse location of the word.
VipshellSrc2008.rar
- VipshellSrc2008 软件简介: 2006年7月15日 主要功能: 1.屏幕监视/控制。 2.CMD命令行 3.摄象头 4.文件管理 5.进程管理 6.键盘记录 其中键盘记录,没有使用钩子记录,为了防止一些杀毒软件阻止安装钩子 虽然没有钩子,但是对于一般的密码窗口,IE窗口也依然能准确记录(包括粘贴).,VipshellSrc2008 Software Introduction: July 15, 2006 main functions: 1. Screen m
screenfectword.rar
- 是用钩子实现的屏幕抓词程序,很象金山的效果,希望多多指教,Is the realization of the screen hook grasping the term process, much like the effect of Jinshan, I hope the exhibitions
mousehook.rar
- 在系统中挂接全局鼠标钩子,可以捕获任何时刻任何程序中的鼠标位置。,Articulated in the system global mouse hook, you can capture any process at any time the location of the mouse.
进程窗体拦载的钩子
- 一个进程窗体拦载的钩子,可以捕获当前窗体的标标及进程文件名等,Form a process to stop the hook set, you can capture the current form of the superscr ipt and subscr ipt process file name, etc.
keyhook.rar
- 利用键盘钩子开发按键发音程序,通过这个程序,可以了解hook的使用方法。,The use of a keyboard button hook pronunciation procedures developed through this process, you can learn to use the hook.
Fools.rar
- 本程序采用VS2008.Net制作。模仿了死机或蓝屏(两者之间随机)。 系统用到Graphic、进程操作、屏幕截图截图、键盘钩子、注册表等,适合新人学习Winform程序之用。 由于系统模仿了死机和蓝屏,可在3秒内点击鼠标以解锁。否则只能重启电脑。 /// 鼠标码:11211233312 (“1”为鼠标左键,“2”为鼠标右键,“3”为鼠标中键) ,VS2008.Net produced using this procedure. Mimic a crash or blue scree
jianpanjilu.rar
- 键盘记录的C++实现,以及SMTP的C++实现,。程序通过系统钩子函数捕获键盘输入,通过SMTP协议以邮件方式发送到邮箱,Record keyboard the C++ implementation, as well as SMTP implementation of the C++,. Process through the system keyboard hook function to capture, through the SMTP protocol to send messages
BIOSRootkitIVTHook.rar
- BIOS Rootkit为了达到控制系统流程的目的,一般会采用Hook IVT,即Hook中断向量表的方式来实现。IVT Hook的实现和检测,涉及许多具体的问题。因此,我把IVT Hook分几部分来进行讨论。在本节和下面几节中,我们将讨论如何借助Bochs的帮助来查看原始IVT、分析IVT Hook情况以及在此基础上写一个简单的IVT检测程序。闲话少说,这就开始我们的旅程吧,BIOS Rootkit process control system in order to achieve the
HookTest.rar
- 一个最简单的键盘钩子,能钩住某些进程的主线程并获得输入按键,One of the most simple keyboard hooks will hook some of the process main thread and get input button
HOOKInfo.ZIP
- 利用钩子获取当前进程正在发生的各种消息(WM_),用于判断该进程所发生的各种事件。,The use of hook to obtain the current process taking place in a variety of sources (WM_), the process used to determine the events.
ProtectProcess
- 不HOOK任何函数,让任务管理器、XueTr、360进程管理器无法结束保护进程(断开链表)-HOOK not any function, so the Task Manager, XueTr, 360 Process Manager can not end the process of protection (off list)
Netiffer
- 网络数据包捕获查看工具, 支持三种 数据包捕获方式: 1、Raw嗅探 2、Hook指定进程API,截获数据包 3、端口数据转发-Network packet capture viewer, Support for packet capture of three ways: 1, Raw sniffer 2, Hook the specified process API, intercepted data packets 3, the port forwar