Home

alias Ediție dubă easyhook iat table Girafă val ridica

Перехват функций (хуки) под Windows в приложениях с помощью C/C++
Перехват функций (хуки) под Windows в приложениях с помощью C/C++

Information | Free Full-Text | MANNWARE: A Malware Classification Approach  with a Few Samples Using a Memory Augmented Neural Network
Information | Free Full-Text | MANNWARE: A Malware Classification Approach with a Few Samples Using a Memory Augmented Neural Network

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]

PDF) A Survey on Function and System Call Hooking Approaches
PDF) A Survey on Function and System Call Hooking Approaches

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Information] Hooking Detection / Bypasses / Details
Information] Hooking Detection / Bypasses / Details

Module Exploring..
Module Exploring..

hooking/Readme.md at master · alphaSeclab/hooking · GitHub
hooking/Readme.md at master · alphaSeclab/hooking · GitHub

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

4 Most Popular API Hooking Libraries [Comparison Guide] | Apriorit
4 Most Popular API Hooking Libraries [Comparison Guide] | Apriorit

bpmtk: Spying on IE | Didier Stevens
bpmtk: Spying on IE | Didier Stevens

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

Sample Instrumentation Program. Trampolines may be created either... |  Download Scientific Diagram
Sample Instrumentation Program. Trampolines may be created either... | Download Scientific Diagram

Windows API Hooking - Hide Process from Task Manager tutorial - YouTube
Windows API Hooking - Hide Process from Task Manager tutorial - YouTube

Kyle Halladay - X64 Function Hooking by Example
Kyle Halladay - X64 Function Hooking by Example

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format  command-line tools and PHP classes. Easily extract structures and  information, modify files, and even construct files from scratch in the  Windows Portable Executable (PE)
GitHub - cubiclesoft/php-winpefile: Windows Portable Executable file format command-line tools and PHP classes. Easily extract structures and information, modify files, and even construct files from scratch in the Windows Portable Executable (PE)

Getting to the root of the problem: A detailed comparison of kernel and  user level data for dynamic malware analysis - ScienceDirect
Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis - ScienceDirect

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

API hooking with Microsoft detours | Infosec Resources
API hooking with Microsoft detours | Infosec Resources

Trampoline and target functions, before and after insertion of the... |  Download Scientific Diagram
Trampoline and target functions, before and after insertion of the... | Download Scientific Diagram

Diverting functions in Windows with IAT patching | Yet Another [à compléter]
Diverting functions in Windows with IAT patching | Yet Another [à compléter]