https://github.com/justcabbage/iathooking
IAT Hooking Example In C++ Targeted Towards The Windows Notepad Application
https://github.com/justcabbage/iathooking
hooking reverse-engineering windows windows-api
Last synced: 10 months ago
JSON representation
IAT Hooking Example In C++ Targeted Towards The Windows Notepad Application
- Host: GitHub
- URL: https://github.com/justcabbage/iathooking
- Owner: JustCabbage
- Created: 2024-04-12T19:35:09.000Z (almost 2 years ago)
- Default Branch: master
- Last Pushed: 2024-04-12T19:37:18.000Z (almost 2 years ago)
- Last Synced: 2025-01-26T07:43:18.256Z (12 months ago)
- Language: C++
- Size: 3.91 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# IATHooking [](https://lbesson.mit-license.org/)
## What is this
This is an implementation of IAT Hooking which hooks functions through the [Import Address Table](https://docs.microsoft.com/en-us/windows/win32/debug/pe-format#import-directory-table). Currently this is targeted towards the windows Notepad application and currently hooks two functions [CreateFileW](https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-createfilew) and [ReadFile](https://docs.microsoft.com/en-us/windows/win32/api/fileapi/nf-fileapi-readfile) however is adaptable to hook any imported functions for most windows PE applications.
## Usage
The project uses [cmake](https://cmake.org/) as its build system, and will output a DLL file which can be injected into the target application. This can be done using any available DLL injector.
## Credits
- [MSDN](https://docs.microsoft.com/)