There are 5 repositories under api-hooking topic.
Resources About Hooking. For All Platforms. Currently 300+ Tools And 600+ Posts.
DirectX API-hooking framework
Advanced native function hooks for x86, x64. Welcome to the next level!
A DLL Injection Detector for Windows.
Vutils or Vic Utilities is an utility library written in Modern C++ and for Modern C++. It helps your programming go easier, faster, and simpler.
dll-hijack based qbittorrent portable plugin
A CMake template for projects using MS Detours
Examples of basic windows API hooking techniques
Different API Hooking Techniques - Ring3 (Detours, Trampoline, IAT and EAT) for both, x64 and x32 PE files - Since 2014.
Implements Windows API hooks in modern C++
Sometimes, you need to manipulate low-level functionality (C APIs, etc) from high-level languages (Python). Eg. Force the low-level calls directly to your own Python override functions. This repo will help you do that.
Samples that shows how to use API Hook libraries: Detours, Deviare, MHook, EasyHook to hide files with the "+/*.txt" file name pattern.
Simple DLL injection protect with the idea of hooking the LoadLibrary function and failing it if it is a call for an unauthorized DLL.
Rewrites filepath on file i/o by hooking NtCreateFile, NtOpenFile and NtSetInformationFile.
An implementation of Proxychains in Rust using API hooking techniques for dynamic proxy routing
Windows PE files import address table (IAT) hooking
AMSI ScanBuffer Patch with API Hook poc
API hooking example project using Microsoft Detours
Let's dive deeper into some key aspects of Inline Hooking in C++
unsafe hacky memory accessor written in go. $ go get -v github.com/nanitefactory/memory
Simple API Hook Sample
DLLInjectionDetector is a simple tool for detecting DLL injections on Windows systems. It focuses on core functionality while maintaining a lightweight design, making it easy to use and adapt. 🛠️🐙
An example of API hooking using Microsoft Detours to analyze the behaviour of function in the Windows API.
Visual Studio framework for rapid development of hook/hijack DLLs
This repository contains a comprehensive analysis of the PandaBanker malware. The analysis includes examining various techniques employed by the malware such as API Hooking, Process Hijacking, and Memory Dumping. The investigation also involves practical steps using various tools to understand the malware's behavior and persistence mechanisms.
A lightweight C++ hooking library using UD2 instruction for stealthy function interception.