CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hook com
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Sub Category
GUI Develop
Windows Kernel
WinSock-NDIS
Driver Develop
ADO-ODBC
GDI-Bitmap
CSharp
.net
Multimedia Develop
Communication
Shell api
ActiveX/DCOM/ATL
IME Develop
ISAPI-IE
Hook api
Screen saver
DirextX
Process-Thread
Console
File Operate
Printing program
Multi Monitor
DNA
Other
Search - hook com - List
[
Windows Develop
]
利用鼠标键盘钩子截获密码(www_dvpx_com)
DL : 1
钩子。看看这个漏洞: http://zdnet.com.com/2100-1105-964057.html win2000和xp在执行搜索的时候, 首先查找根目录而开始菜单的运行窗口里执行命令, 也是首先在系统盘的根目录里进行查找. 这个漏洞其实是已经是公开的秘密了. 既然现在作为漏洞公布出来, 我也就把网上的PasswordReminder.cpp拿来改了改加了一个加超级管理员用户和执行cmd.exe的功能. 使用方法: 把程序解压, 把压缩包里的文件 CMD.EXE (该文件具有隐藏和只读属性) 释放到目标机器的系统盘根目录, 一般都是在C:比如利用UNICODE/Decode漏洞就有写根目录的权限, -hook. Look at this loophole : http://zdnet.com.com/2100-1105-964057.html WIN2000 and xp in the implementation of the search, the first find the root directory and start the operation of the menu window Lane executing orders, as well as first in the root system disk directory for you. The flaw is in fact is already an open secret. Now as loopholes announced, I also put PasswordReminder.cpp use of the Internet changed the change added a super admin users increases and implementation cmd.exe function. Use : decompression procedures, the paper bag compression CMD. EXE (the document is hidden and read-only attribute) released into the target machine's system occurs, are usually in the C : For instance, the use of UNICODE / Decode about writing loopholes in the root directory of the authorit
Date
: 2008-10-13
Size
: 9kb
User
:
三星
[
Windows Develop
]
HookSys_demo
DL : 0
一个演示钩子功能的例程.来自www.codeproject.com。-a demonstration of the hook function routines. From www.codeproject.com.
Date
: 2008-10-13
Size
: 140.09kb
User
:
刘怀国
[
Windows Develop
]
利用鼠标键盘钩子截获密码(www_dvpx_com)
DL : 0
钩子。看看这个漏洞: http://zdnet.com.com/2100-1105-964057.html win2000和xp在执行搜索的时候, 首先查找根目录而开始菜单的运行窗口里执行命令, 也是首先在系统盘的根目录里进行查找. 这个漏洞其实是已经是公开的秘密了. 既然现在作为漏洞公布出来, 我也就把网上的PasswordReminder.cpp拿来改了改加了一个加超级管理员用户和执行cmd.exe的功能. 使用方法: 把程序解压, 把压缩包里的文件 CMD.EXE (该文件具有隐藏和只读属性) 释放到目标机器的系统盘根目录, 一般都是在C:比如利用UNICODE/Decode漏洞就有写根目录的权限, -hook. Look at this loophole : http://zdnet.com.com/2100-1105-964057.html WIN2000 and xp in the implementation of the search, the first find the root directory and start the operation of the menu window Lane executing orders, as well as first in the root system disk directory for you. The flaw is in fact is already an open secret. Now as loopholes announced, I also put PasswordReminder.cpp use of the Internet changed the change added a super admin users increases and implementation cmd.exe function. Use : decompression procedures, the paper bag compression CMD. EXE (the document is hidden and read-only attribute) released into the target machine's system occurs, are usually in the C : For instance, the use of UNICODE/Decode about writing loopholes in the root directory of the authorit
Date
: 2025-12-20
Size
: 9kb
User
:
三星
[
Windows Develop
]
HookSys_demo
DL : 0
一个演示钩子功能的例程.来自www.codeproject.com。-a demonstration of the hook function routines. From www.codeproject.com.
Date
: 2025-12-20
Size
: 140kb
User
:
刘怀国
[
Windows Develop
]
Starter
DL : 0
D3D HOOK模块,可用于制作DX类游戏的外挂,如透视等效果,支持DX8,DX9游戏,用法是将D3D8或D3D9文件夹里的d3d9dev.cpp,d3d9int.cpp,d3d9tex.cpp中的函数内容修改后编译生成DLL,再编译Injector注入,编译环境最好用VS.NET2003,有相应DX SDK,注入器必须用自带的Injector,否则可能没有效果-D3D HOOK module, can be used to create the plug-in DX games, such as the effect of perspective, etc. to support DX8, DX9 games use is to D3D8 or D3D9 folder d3d9dev.cpp, d3d9int.cpp, d3d9tex.cpp modify the contents of the function After the compiler to generate DLL, and then compiled into the Injector, the compiler is best to use the environment VS.NET2003, corresponding DX SDK, injector must own Injector, or may not have the effect of
Date
: 2025-12-20
Size
: 72kb
User
:
盘类
[
Windows Develop
]
EDAHelper
DL : 0
pads2007 鼠标増强软件,vc实现。 本软件是部分EDA软件的鼠标增强工具,将EDAHelper.exe和Hook.dll同时放到任意目录,运行EDAHelper.exe就行,现在已不再自动运行EDA软件,支持protel99se,DXP,POWERPCB,OrCAD的capture 依然不保留版权,任何人都可以修改,但请不要用于营利目的。当然如果你觉得应该增加更多更好功能,另介意联系原作者QQ:126186,Email:spacexplorer@163.com。-pads2007 mouse Masuda strong software, vc achieved. This software is part of the EDA software, mouse enhancement tools will EDAHelper.exe and Hook.dll into any directory at the same time, run EDAHelper.exe on the line, now no longer automatically run the EDA software, support protel99se, DXP, POWERPCB, OrCAD' s capture is still not retain copyright, anyone can modify, but please do not used for commercial purposes. Of course, if you feel should be added more and better features, and the other mind contact the original author QQ: 126186, Email: spacexplorer@163.com.
Date
: 2025-12-20
Size
: 515kb
User
:
wangli
[
Windows Develop
]
muvb
DL : 0
奇迹(MU)通用登陆器 适用于私服站长配置后给玩家下载使用. 其中在设置中ip加了密,端口文件放在WEB服务器器上,只需设置 web文件地址即可(地址也加了密)例如:端口文件是 http://www.1234.com/dk/123.txt (当然也可以是*.ini或*.dat或*.*) (那么你以后更改端口只需更改123.txt里面 1.你编译的主程序文件 (名字由你随便改) 2.ckh.exe (窗口化工具,我们要调用的)提示:窗口化工具不用理它,都可以在登陆器设置,但不用关闭它.... 3.hook.dll (有它 窗口化工具 才能正常运行) 4.Option.ini (记录你配置的ip和端口文件地址以及其它的一些西西) 5.readme.htm (内容随你改!) 6.logo.jpg (你家奇迹的logo,谁你改,你怎么配置怎么画都可以-_-!) 7.MSINET.OCX (vb的一个控件,用来读取远程服务器端口文件的东东,这个一定要,不然....可以就不能登陆了)-Miracle (MU) General landers Sifu configured for owners to download the player. Ip in the settings of which added a secret, port file on the WEB server, device, simply set the web document address below (address also included a secret) For example: port file is http://www.1234.com/dk/123.txt (of course, can also be a*. ini or*. dat or*.*) (Then you only need to change the future to change the port inside 123.txt 1. Do you compile the main program file (you just change the name from) 2.ckh.exe (window-based tools, we have to call) Tip: Windows-based tool that is not of it, can be set up in the landers, but do not close it .... 3.hook.dll (has its own window tools to work properly) 4.Option.ini (record your ip and port configuration file address, as well as some other cc) 5.readme.htm (content as you change!) 6.logo.jpg (a miracle in your house logo, change who you are, how do you configure how art can be-_-!) 7.MSINET.OCX (vb of a control, the remote server por
Date
: 2025-12-20
Size
: 169kb
User
:
chending
[
Windows Develop
]
SeeCom
DL : 0
用钩子技术,操作com口,和传统的方法不同-With the hook the technical, operational com port, and the traditional methods are different
Date
: 2025-12-20
Size
: 133kb
User
:
shiweilei
[
Windows Develop
]
SherlockEye-V3.0
DL : 0
//*** *** *** *** *** *** *** *** *** 2010.12.21 发布源代码。 使用最简单的截图方法实现作弊功能 主要掌握BMP文件的读取与保存,BMP文件格式 提升空间: 1、在作弊器上点击不同处,使用发送消息之类的方法给游戏处理。 2、使用HOOK方法,直接修改游戏实现瞬间秒杀。 //*************************************************** 2011.2.17 1、添加消息发送功能。通过点击作弊器界面映射到游戏界面。 2、使用SetStretchBltMode方法解决图片缩小时候的失真问题。 V2.0 http://hi.baidu.com/lzwml1989/blog/item/53951682de2df4c69023d972.html V3.0 http://hi.baidu.com/lzwml1989/blog/item/daf96f19ea65030a8718bf53.html-//*************************************************** 2010.12.21 released the source code. The simplest way to use a screenshot of the main control functions to achieve cheating read and save BMP file, BMP file formats room for improvement: 1, click on the cheating device differences, the use of methods like send a message to the game processing. 2, using the HOOK method, directly modify the game to achieve an instant spike. //*************************************************** 2011.2.17 1, add a message sending. Interface by clicking the map to the game cheat interface. 2, the use of SetStretchBltMode solution to reduce the image distortion when the problems. V2.0 http://hi.baidu.com/lzwml1989/blog/item/53951682de2df4c69023d972.html V3.0 http://hi.baidu.com/lzwml1989/blog/item/daf96f19ea65030a8718bf53.html
Date
: 2025-12-20
Size
: 882kb
User
:
吴梦龙
[
Windows Develop
]
fileqingli
DL : 0
自编自写的VB文档清理工具,重点读取文档的打印日期和最后编辑日期,网上代码基本都是要调用word或excel打开文档,才能读取摘要信息,感觉严重不妥,所以依托dsofile.dll重写了一个。DirectCOM.dll是自己用PowserBasic写的免注册调用Com的,原理就是Hook,自己实现CoCreateInstanceEx。 整个文件夹(包括文件夹本身) "E:\t\" 文件夹内所有文件 "E:\t\*" 多个文件 "E:\t\a.txt" & Chr(0) & "E:\t\b.txt" 想直接彻底删除文件可用 Kill 语句 想重命名文件可用 Name As 语句-Directed and written by VB documentation cleanup tool, focusing on the date of the document to read print and last edited date, basically to invoke the online code word or excel document is opened, in order to read the summary information, feel seriously wrong, so relying dsofile. dll rewrite one. DirectCOM.dll with PowserBasic write their own free registration call Com, the principle is the Hook, to achieve their own CoCreateInstanceEx. The entire folder (including the folder itself) " E: \ t \" folder all files " E: \ t \*" multiple file " E: \ t \ a.txt" & Chr (0) & " E : \ t \ b.txt " want to completely delete files directly available Kill statement want to rename files available Name As statement
Date
: 2025-12-20
Size
: 167kb
User
:
wpudn12
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.