Skip to content

ezhangle/Deviare-InProc

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Deviare In-Process is a code interception engine for Microsoft Windows® developed by Nektra Advanced Computing.

This library is at the core of our Deviare 2.0 (hooking for the masses) and SpyStudio Application Monitor technologies. Deviare is an alternative to Microsoft Detours® but with a dual license distribution.

The library is coded in C++ and provides all the facilities required to instrumenting binary libraries during runtime. It includes support for both 32 bit and 64 bit applications and it implements the interception verifying different situations that can crash the process. If you need to intercept any Win32 functions or any other code, this library makes it easier than ever.

Unlike the rest of the libraries, Deviare In-Process provides a safe mecanism to implement multi-threaded application API hooking. When an application is running, more than one thread can be executing the code being intercepted. Deviare In-Process provides safe hooking even in this scenario.

Additionally, Deviare In-Proc only depends on NTDLL.DLL, no Kernel32 nor another library is used. It does a dynamic discovery of needed apis in order to eliminate NTDLL static binding when used in an application or dll.

Please read the README.txt file for building and usage instructions.

About

Deviare In Process Instrumentation Engine

Resources

License

Unknown, GPL-3.0 licenses found

Licenses found

Unknown
LICENSE.COMMERCIAL
GPL-3.0
LICENSE.GPL

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 62.6%
  • C++ 35.3%
  • Assembly 1.4%
  • Shell 0.7%