hook_raw.txt

来自「Cracker终结者——提供最优秀的软件保护技术」· 文本 代码 · 共 16 行

TXT
16
字号
 HOOK_RAW can be used for hooking nonexported code.
It is advantageous to use this dwFlag with symbols.
 HOOK_RAW can be combined with HOOK_NOT_9X, HOOK_NOT_NT,
HOOK_HARD.
 HOOK_RAW has the same limitations and format like
HOOK_OVERWRITE, but ModuleExport can contain everything
except HOOKS_END and HOOKS_DYNAMIC, ApiNameOrOrd must
contain virtual address (valid in Target) of code to
hook.

 Test: runme.bat (ApiHooks -nq Hooks ModuleWithSymbols)
Hooks.dll contains 2 symbol hooks, 1 hardcodedVA hook
and 1 API hook. Presence of VA hook means that
Hooks.dll is calibrated (can be used) with
ModuleWithSymbols.exe in this directory only.

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?