HookMe | Exported from https : //code.google.com/archive/p/hookme/
kandi X-RAY | HookMe Summary
kandi X-RAY | HookMe Summary
HookME is a software designed for intercepting communications by hooking the desired process and hooking the API calls for sending and receiving network data (even SSL clear data). HookMe provides a nice graphic user interface allowing you to change the packet content in real time, dropping or forwarding the packet. It also has a python system plugin to extend the HookMe functionality. It can be used for a lot of purposes such as: 1. Analyzing and modifying network protocols 1. Creation of malware or backdoors embebed into network protocols 1. Protocol vulnerability memory patching 1. Firewall at protocol layer 1. As postexplotation tool 1. whatever you can create with plugins using your imagination.
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of HookMe
HookMe Key Features
HookMe Examples and Code Snippets
Community Discussions
Trending Discussions on HookMe
QUESTION
I'm trying to hook a function using PAGE_GUARD but it does not raise any exception when the page/address is called.
...ANSWER
Answered 2018-May-28 at 04:15It is possible, depending on your compiler, that the call to HookMe
is inlined. Inspect the generated code. You should be able to defeat this with something like __declspec(noinline)
on the declaration of HookMe
. (MS VC++). Note that you can take the address of a function even if it is inlined at all calls!
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install HookMe
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page