Welcome![Sign In][Sign Up]
Location:
Search - hook ss

Search list

[Hook apihookimportfunction

Description: 实现屏幕取词的技术方案和部分源码,第二个hook我没有编译测试过 因为我没有VC++1.52.所以代码可能会有错。 建议使用Borland c++,按16位编译。 如果用VC++1.52,则要改个选项 在VC++1.52的Option里,有个内存模式的设置,选大模式,和\"DS!=SS DS Load on Fun ction entry.\",切记,否则会系统崩溃。
Platform: | Size: 9907 | Author: 杨雷亮 | Hits:

[Hook apiSSDT

Description: 通过例子介绍了Windows系统服务调用的基本知识及Hook SSDT的方法-by example on the Windows system service called the basic knowledge and methods Hook SSDT
Platform: | Size: 1024 | Author: zhangyoufu | Hits:

[Hook apihookimportfunction

Description: 实现屏幕取词的技术方案和部分源码,第二个hook我没有编译测试过 因为我没有VC++1.52.所以代码可能会有错。 建议使用Borland c++,按16位编译。 如果用VC++1.52,则要改个选项 在VC++1.52的Option里,有个内存模式的设置,选大模式,和"DS!=SS DS Load on Fun ction entry.",切记,否则会系统崩溃。 -Screen technology to achieve program and some source code, the second hook I did not compile because I did not tested VC++ 1.52. Therefore, the code may be wrong. Recommend the use of Borland c++, According to 16-bit compiler. If VC++ 1.52, will have to change options in VC++ 1.52 of the Option, there is a memory mode settings, large selection mode, and DS! = SS DS Load on Function entry. , Bear in mind Otherwise, it would crash.
Platform: | Size: 9216 | Author: 杨雷亮 | Hits:

[OS programSSDT

Description:
Platform: | Size: 20480 | Author: 冈崎汐 | Hits:

[Hook apianti-hook-ssdt

Description: ssdt钩子检测,利用查找ntkrnlpa.exe中导出的ssdt的起始地址和大小,比较实际的ssdt地址表中的内容,找出钩子-ssdt hook detection, the use of export ntkrnlpa.exe Find ssdt the start address and size, a more realistic ssdt address the contents of the table to find out hook
Platform: | Size: 6144 | Author: john smith | Hits:

[Software Engineeringss

Description: 自认为很好的3个工具,关屏幕的LCD,挂机锁,自动关机的小工具,相信对大家很有用-Consider themselves a very good three tools, off screen LCD, hook locks, automatic shutdown of a small tool, I believe are useful to everyone
Platform: | Size: 346112 | Author: ffffffffff | Hits:

[VC/MFCssdthook

Description: 这本书主要介绍了vc中基于ssdt hook 技术,可以很好的帮助你。-This book introduces the vc ssdt hook based technology that can very well help you.
Platform: | Size: 655360 | Author: 赵强 | Hits:

[Driver DevelopProtectMon

Description: 驱动开发,根据PID保护进程,HOOK了 SSDT NtOpenProcess函数,至少可以抵御一切R3病毒终结你的进程!!适合新手学习HOOK ssdt的入门研究-Driven development, the protection under the PID process, HOOK the SSDT NtOpenProcess function, at least the end of you against all the process of virus R3!! Suitable for beginners to learn HOOK ssdt entry of
Platform: | Size: 2048 | Author: coorell | Hits:

[Hook apianti-ssdt

Description: Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle is to find the function by address jump. So long as the original forged an SSDT, you can make SSDT-HOOK invalid.
Platform: | Size: 5120 | Author: 何耀彬 | Hits:

CodeBus www.codebus.net