![]() |
#1
|
|||
|
|||
[C++ Sample] DLL injection and API hooking
I needed a program to think its not running in a terminal session so I threw something together from existing lib's that does the job: https://github.com/DavidXanatos/HideTS
Very simple using the MinHook lib. Given how simple it is I thought it may be a good sample for anyone who needs to hook some windows API in some program for whatever reason. Might be useful to some beginners. |
The Following 2 Users Gave Reputation+1 to DavidXanatos For This Useful Post: | ||
MarcElBichon (06-06-2020), user1 (05-19-2020) |
The Following 11 Users Say Thank You to DavidXanatos For This Useful Post: | ||
#2
|
||||
|
||||
![]()
for .NET applications example?
|
#3
|
|||
|
|||
No .NET yet...
But I have reworked the Injector: https://github.com/DavidXanatos/HideTS/tree/master/Injector It now injects without using create remote thread by hijacking the main thread, and it has an option to disable the parelell dll loading introduced with a recent win 10 edition. Also the injector doesn't longer need to be the same bit'ness as the target process and dll, well if its 64 bit it can do booth, it its 32 bit it can only do 32, so well its half universal LOL. |
#5
|
|||
|
|||
The Following 2 Users Gave Reputation+1 to DavidXanatos For This Useful Post: | ||
Insid3Code (06-09-2020), user1 (06-09-2020) |
The Following User Says Thank You to DavidXanatos For This Useful Post: | ||
user1 (06-09-2020) |
#6
|
||||
|
||||
https://sanet.st/blogs/islamayman/dll_injector_hacker_pro.3586757.html
__________________
Decode and Conquer |
#7
|
|||
|
|||
hook GetSystemMetrics
|
![]() |
Thread Tools | |
Display Modes | |
|
|
![]() |
||||
Thread | Thread Starter | Forum | Replies | Last Post |
Malware Sample analysis | Aesculapius | Source Code | 2 | 02-13-2018 19:35 |
malevolous pdf sample | Shub-Nigurrath | General Discussion | 3 | 02-08-2014 01:03 |