DllHook
kernel32.dll patcher library
Install / Use
/learn @irp/DllHookREADME
I use loader.cpp to inject the file.dll in the virtual address space of the target process.
I disassemble the 5 bytes of the target instruction exported from kernel32.dll (OpenProcess in the example try.cpp/try.dll)
and I put an immediate jmp to my Hook routine (a simple call to ExitProcess(0) in the example)
storing the old 5 opcode bytes (with modrm, sib etc.) in a struct called Ponte.
try.cpp is the file.dll called from the loader. In this file I use
extern "C" VOID NTAPI stuff (__in PBYTE pTar, __in PVOID pfHook);
function defined in bitch.h.
Related Skills
node-connect
349.7kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
109.7kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.7kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
qqbot-media
349.7kQQBot 富媒体收发能力。使用 <qqmedia> 标签,系统根据文件扩展名自动识别类型(图片/语音/视频/文件)。
