搜索资源列表
catwork0601
- 1、我想调用 SetWindowsHookEx 来设置 WH_CBT 钩子,但我了解到 MFC 也安装了这个钩子,也就是在一个线程中安装了两次 WH_CBT,这样做能行吗? 2、我正在将一个现有的 C++ 类库转换为托管扩展,以便能在 .NET 框架客户端使用它们。我的代码调用了 API 函数,这些函数需要当前运行模块的 HINSTANCE。我不想使用我的 DLL 的 HINSTANCE;我想让调用者提供 EXE 的 HINSTANCE,该 EXE 调用我的 DLL。我能将 HINST
sendhook
- 使用线程插入的*.可以在进程管理器中隐藏.-use of the keyboard thread insert records. In the process managers concealed.
RootKit
- 检测进程的代码,可以查出当前Rootkit进程。推荐!(使用挂钩线程调度链表) -detection process code, we find the current Rootkit process. Recommended! (Using thread scheduling chain link)
AgaKBoardHook
- 反thread和global钩子的应用,可以分别实现反两种钩子-anti-thread the hook and global applications can be realized against the two hook
getremotewndprocdemo
- 获取其它进程中窗口的窗口过程 创建远程线程的方式,可以在其它进程内创建一个新的线程,并且可以指定这个线程的线程函数-access to other process window of the process of creating long-range window thread, in other processes to create a new thread, and can specify the function thread Thread
APIHookingPart3_src
- This the third, fourth (and last) part for building a thread deadlock detector. Please see the first and second article to understand wait is going on : A (working) implementation of API hooking (Part II)
inject
- 线程插入explor.exe,启动d-Thread insert explor.exe, start dll
anit
- Windows应用程序是基于消息驱动的,任何线程只要注册窗口类都会有一个消息队列用于接收用户输入的消息和系统消息。为了拦截消息,Windows提出了钩子的概念。钩子(Hook)是Windows消息处理机制中的一个监视点,钩子提供一个回调函数。当在某个程序中安装钩子后,它将监视该程序的消息,在指定消息还没到达窗口之前钩子程序先捕获这个消息。这样就有机会对此消息进行过滤,或者对Windows消息实现监控。-Windows application is based on the message-dri
REMOTETHREAD
- 一个远程线程注入的例子,注入notepad, VC6 环境。-A remote thread into the case, into the notepad, VC6 environment.
Detours-Express-3.0
- 拦截API调用,将其引导到自己的子程序,从而实现WIN32 API的定制。为一个已在运行的进程创建一新线程,装入自己的代码并运行。 -Intercept API calls, will lead to his son the program, so as to realize the customized WIN32 API. For a has set up a file in the operation of the process to create new thread, into it
killhs
- 通过 HOOK PsCreateSystemThread 监控线程,入口函数特征码对比来过hs防护软件的保护,asm源码非常不错-HOOK PsCreateSystemThread through the monitoring thread, imported function signature hs been compared to the protection of protective software, asm source code is very good
VB
- 一个利用VB远线程注入技术实现键盘拦截的例子注意:非 Ctrl+Alt+Del 键使用普通钩子技术,因此 程序在退出时注意要卸载钩子。 -Using VB far into a thread an example of technology to intercept the keyboard Note: Non-Ctrl+ Alt+ Del key technology using ordinary hook, so pay attention to exit the program to
HookSy
- 注入技术简述: 本实例其实是一个查看工具。完成以下的几个功能: 1、查看系统当前的运行进程; 2、查看系统当前的运行线程; 3、查看系统中运行某个进程中包含的DLL列表; 4、通过创建远程线程的方法将DLL注入到目标进程中: 5、通过Hook方法将DLL注入到目标进程中: -A brief injection technique: This example is actually a view tool. Completion
Hook
- 利用Hook在系统进程插入线程的改进版本. -Hook the process to use the system to improve the version of the thread insert.
BossHook
- 在.Net2.0环境上开发WinForm程序,当在多线程中修改界面控件的状态,会抛出一个异常:Cross-thread operation not valid:Control textBox1 accessed from a thread other than the thread it was created on .后查询知道这是因为.net 2.0以后加强了安全机制,不允许在winform中直接跨线程访问控件的属性。到网上Google下,找到的解决方案有三种,现将这三种解决方案整理如下:
InjectDll(vccode)
- 远程线程DLL注入,vc源码,远程线程DLL注入,vc源码-DLL into the remote thread, vc source, remote-threaded DLL injection, vc source
Hook_example_test
- Hook编程的例子,与本线程和桌面全部线程的交互-some example for hook, for current thread and thread of all in the desktop
Remote-thread-injection
- 创建远程线程,无DLL直接注入其他进程!没有全部注入,只注入特定进程!可以自己改为全注入!-Create a remote thread, no DLL is injected directly into other processes! Not all of implantation, only into the specific process! Can inject itself into the whole!
Thread
- 远线程注入VB源码,dll注入-VB source code into far thread, the DLL injected
Thread-Insert
- 线程插入技术,将自己的代码注入其它运行的进程中。-Thread insert technology, injecting code into other processes running.
