It's under a free license, lets you write hooks not only from C/C++, but also from any .NET language (architecture-independent). It makes any sort of API hooking a breeze.
Edit: Forgot to mention, it automatically sets up a remoting channel for you. That way, you can do IPC between your hooking application and the hookee trivially.
[+] [-] est|16 years ago|reply
And HTTPAnalyzer could sniff HTTPS traffic easily. It's DLL injection and it can un-gzip data.
[+] [-] markgamache|16 years ago|reply
HTTPAnalyzer is great for HTTPS, but not pure SSL, such as LDAPS, in the example.
[+] [-] joshu|16 years ago|reply
[+] [-] FahnRobier|16 years ago|reply
As a client, you would stunnel local:389 to remote:636. As a server you would stunnel local:636 to local:389.
Then you can sniff on the unencrypted port with wireshark,etc.
Thanks for the pointer to detours.
[+] [-] rawr|16 years ago|reply
I have similar feelings about Detours. Microsoft Research is in their own little world sometimes.
[+] [-] daeken|16 years ago|reply
It's under a free license, lets you write hooks not only from C/C++, but also from any .NET language (architecture-independent). It makes any sort of API hooking a breeze.
Edit: Forgot to mention, it automatically sets up a remoting channel for you. That way, you can do IPC between your hooking application and the hookee trivially.