您最多选择25个主题 主题必须以字母或数字开头,可以包含连字符 (-),并且长度不得超过35个字符
aaaaaa aaaaaaa c7b6246025 export symbols in test_cases 7 年前
..
README.md recreate project as DLL 7 年前
advanced_instructions.asm recreate project as DLL 7 年前
advanced_instructions.h export symbols in test_cases 7 年前
assemble.ps1 recreate project as DLL 7 年前
backwards.asm recreate project as DLL 7 年前
backwards.h export symbols in test_cases 7 年前
catch.hpp recreate project as DLL 7 年前
export.def export symbols in test_cases 7 年前
main.cpp export symbols in test_cases 7 年前
simple_tests.asm recreate project as DLL 7 年前
simple_tests.h export symbols in test_cases 7 年前
test_cases.h export symbols in test_cases 7 年前
test_cases.vcxproj export symbols in test_cases 7 年前
test_cases.vcxproj.filters export symbols in test_cases 7 年前

README.md

Introduction

This project aims to give a simple overview on how good various x64 hooking engines (on windows) are. I’ll try to write various functions, that are hard to patch and then see how each hooking engine does.

I’ll test:

(I’d like to test detours, but I’m not willing to pay for it. So that isn’t tested :( )

There are multiple things that make hooking difficult. Maybe you want to patch while the application is running -- in that case you might get race conditions, as the application is executing your half finished hook. Maybe the software has some self protection features (or other software on the system provides that, e.g. Trustee Rapport)

Evaluating how the hooking engines stack up against that is not the goal here. Neither are non-functional criteria, like how fast it is or how much memory it needs for each hook. This is just about the challenges the function to be hooked itself poses.

Namely:

  • Are jumps relocated?
  • What about RIP adressing?
  • If there’s a loop at the beginning / if it’s a tail recurisve function, does the hooking engine handle it?
  • How good is the dissassembler, how many instructions does it know?
  • Can it hook already hooked functions?

Test cases ==========