Skip to content

Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.

Notifications You must be signed in to change notification settings

learn-more/hook-scanner

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 

Repository files navigation

hook-scanner

Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.

Procedure

  1. The process enumerates every modules .text section and dissassembles each instruction using zydis dissassembler
  2. The instruction is compared against the module on disk to check for patch.
  3. If it is a patched instruction checks if it is a jmp and proceeds to resolve the jmp destination
  4. If the jmp destination leads to an absolute jmp it follows it and prints the result (module + offset)
  5. It can be customized to decent int3 (breakpoint hooks) and other patches like nop
  6. Before logging gets symbol name of remote function for easier/cleaner analysis
  7. It can be customized to skip modules that you don't want to get scanned here

Example Usage

Valorant Example

Note: this project was coded in 1 day so it might have some bugs (open ticket)

Usage

hook_scanner.exe process.exe

About

Scans all modules in target process for jmp/int3 hooks dissassembles then and follows jmps to destination.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 97.0%
  • C++ 3.0%