Home

Cu plăcere sfaturi capilarele easyhook iat table Precondiție toxicitate Redirecţiona

Captain Hook
Captain Hook

hooking/Readme.md at master · alphaSeclab/hooking · GitHub
hooking/Readme.md at master · alphaSeclab/hooking · GitHub

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

Easyhook中文帮助文档- CSDN
Easyhook中文帮助文档- CSDN

Win32 - CodeProject
Win32 - CodeProject

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

GitHub - timdiels/sysintercept: System call interceptor for windows
GitHub - timdiels/sysintercept: System call interceptor for windows

Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and  Techniques for Fighting Malicious Code (2011)
Memory Forensics: Rootkits - Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code (2011)

Перехват функций (хуки) под Windows в приложениях с помощью C/C++
Перехват функций (хуки) под Windows в приложениях с помощью C/C++

GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format  command-line tools and PHP classes. Easily extract structures and  information, modify files, and even construct files from scratch in the  Windows Portable Executable (PE)
GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format command-line tools and PHP classes. Easily extract structures and information, modify files, and even construct files from scratch in the Windows Portable Executable (PE)

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Module Exploring..
Module Exploring..

Captain Hook Pirating AVs to Bypass Exploit Mitigations
Captain Hook Pirating AVs to Bypass Exploit Mitigations

Trampoline and target functions, before and after insertion of the... |  Download Scientific Diagram
Trampoline and target functions, before and after insertion of the... | Download Scientific Diagram

HOOK IAT 代码示例_S1lenc3的博客-CSDN博客
HOOK IAT 代码示例_S1lenc3的博客-CSDN博客

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Module Exploring..
Module Exploring..

Kyle Halladay - X64 Function Hooking by Example
Kyle Halladay - X64 Function Hooking by Example

bpmtk: Spying on IE | Didier Stevens
bpmtk: Spying on IE | Didier Stevens

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]