Description: When you caught on the network data packets and would like to know which of these packages is issued to the process, how do? This small tools may be able to help some busy. This tool is used in the process of winsock HOOK API, some data is recorded.
- [kingsoft powerword-hook] - the screen get word technology of kingso
- [hook_winsock] - to you how hooked windows of a socket ap
- [SSDT_hook] - SSDT hook example (hiding processes) Cor
- [XPhook] - I used the XP detour. also used to hook
- [p2p-Source] - From support p2p downloading, online pla
- [ROOTKITS] - ROOTKITS- Windows kernel security sourc
- [xHook] - The HOOK on the SOCKET all API function
- [API999999] - Robbery API, hook invincible! Band demo!
- [zhuru_yuanma] - Dll into a remote source, syringe _ sour
File list (Check if you may need any files):