Skip to content

Implementation of the well-known hook&inject technique for intercepting function calls within a process

Notifications You must be signed in to change notification settings

Alvov1/HookAndInject

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 

Repository files navigation

HookAndInject

Implementation of the well-known hook&inject method for intercepting calls to WinAPI functions inside a process without using the Windows Detours API: https://habr.com/ru/post/90377/

Project consists ot the injector application and DLL. Application is responsible for injecting the DLL into the target process. Injecting requires acquiring the debugging priveleges. DLL once being injected into the process, starts to intercept specified function calls. Targetted function pointers with the realized stubs are listed in the Proxies.h/.cpp. JMP near instruction followed by the relative offset in the memory is used for the function call interceptions. During function substitution, all threads in the target process are stopped and then resumed.

About

Implementation of the well-known hook&inject technique for intercepting function calls within a process

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published