We are comparing our hooking engine Deviare with some of the other products available, so that you can get an idea of what each engine can provide.
Here is a comparison of Deviare against Easy Hook.
Functionality | Deviare | EasyHook |
---|---|---|
Database with Functions and Data Types | ![]() |
![]() |
Intercept multiple functions with a single handler | ![]() |
![]() |
Selective Handler for each Function | ![]() |
![]() |
Relocation of Relative ASM Instructions (RIP) | ![]() |
![]() |
Save & access Call Function Context | ![]() |
![]() |
Access registers & flags | ![]() |
![]() |
Access return address | ![]() |
![]() |
Get/Set win32 last error | ![]() |
![]() |
Monitor COM Objects creations | ![]() |
![]() |
Hook COM Objects | ![]() |
![]() |
Provides COM Interfaces accessible from any language | ![]() |
![]() |
Enumerate process’ modules | ![]() |
![]() |
Enumerate module’s exported functions | ![]() |
![]() |
Get module path and info | ![]() |
![]() |
Automated call of original function | ![]() |
![]() |
Thread Deadlock Block | ![]() |
![]() |
64 bits support | ![]() |
![]() |
Thread Safe Hook Install | ![]() |
![]() |
Native Support | ![]() |
![]() |
Inter-Process Communication | ![]() |
![]() |
Custom Library Injection | ![]() |
![]() |
Stealth Support | ![]() |
![]() |
Kernel Mode Hook | ![]() |
![]() |
Driver Installation | ![]() |
![]() |
Relocation of Instruction Pointer | ![]() |
![]() |
Requires .Net Framework | ![]() |
![]() |
Use System Runtimes (CRT) | ![]() |
![]() |
Hook Terminal Sessions | ![]() |
![]() |
Full unload before target termination. | ![]() |
![]() |
Execute As Service | ![]() |
![]() |
Prevent execution inside OS Loader | ![]() |
![]() |
Thread selection filter | ![]() |
![]() |
StackTrace | ![]() |
![]() |
User-mode Wide Hook | ![]() |
![]() |
I believed to know about hooking code until reading this functionality table. Where can I learn more about each of the listed features?