Skip to content

Latest commit

 

History

History
4 lines (3 loc) · 763 Bytes

README.md

File metadata and controls

4 lines (3 loc) · 763 Bytes

HookAndInject

Implementation of the well-known hook&inject method for intercepting calls to WinAPI functions inside a process without using the Windows Detours API: https://habr.com/ru/post/90377/

Project consists ot the injector application and DLL. Application is responsible for injecting the DLL into the target process. Injecting requires acquiring the debugging priveleges. DLL once being injected into the process, starts to intercept specified function calls. Targetted function pointers with the realized stubs are listed in the Proxies.h/.cpp. JMP near instruction followed by the relative offset in the memory is used for the function call interceptions. During function substitution, all threads in the target process are stopped and then resumed.