DeepBlueSea
August 15th, 2008, 10:31
I don't know if someone might find this useful and/or if it is even considered a RCE-Tool.
Nevertheless i just wanted to share my tool here.
It is currently BETA and by no means stable.
[1] Homepage: http://home.arcor.de/neotracer/hookshark.html
[2] Download: http://home.arcor.de/neotracer/HookShark.rar
Nevertheless i just wanted to share my tool here.

It is currently BETA and by no means stable.
Quote:
HookShark is a detector of installed hooks and patches installed on the system (only usermode for now). It scans through the code-section of every loaded module of each running process and compares it with the file-image. If it detects discrepancies it tries to determine the type of hook or patch and reports it to the user. The detailed report about the type of patch is not 100% reliable and can be wrong. HookShark makes many assumptions and guesses during analysis and report[...] |
Code:
Currently detects following hooks/patches:
* - Inline patches / Hooks (NOP, Exceptionhandler, relative/direct Jumps)
* - Other custom patches [...]
* - IAT and EAT Hooks
* - Relocation Hooks
* - Hardware Breakpoints
Currently unhooks following hooks/patches:
* - Inline patches / Hooks (NOP, Exceptionhandler, relative/direct Jumps)
* - Other custom patches [...]
* - IAT and EAT Hooks
* - Relocation Hooks
* - Hardware Breakpoints
[1] Homepage: http://home.arcor.de/neotracer/hookshark.html
[2] Download: http://home.arcor.de/neotracer/HookShark.rar