Deviare Documentation

1.0

Overview:

Nektra Deviare is a library created to implement Code Interception. This software may be used locally or in a remote process if enough permissions are granted. We provide an API that overcomes many difficulties and common issues when attempting to change an application behavior in runtime. Also, this API is simple enough for the user to start testing it with very few lines of code.

When a Hook is installed the specified function is intercepted in order to execute some code before and after the original function is run. In the package there are several examples that can help you when you start with Nektra Deviare.

Examples:

Console: C++ Console that let you intecept functions in any process, intercept functions in all process and intercept functions of a process executed from the Console. It displays function calls with full information about the parameters, fields of the structures are expanded and call stack information.

DeviareComConsole: Example of interception of COM objects. To use need first to install a Monitor to wait until the desired interface is created. Then, you can choose to install a hook in the created interfaces seen in the Monitor. The problem is that we don't know the address of the functions of the COM interfaces until an object is created. Then, calls of the intercepted interfaces are displayed.

DeviareCSharp: Small example that intercepts send and recv of ws2_32.dll and display the text sended and received thought these functions.

DeviareCSharpConsole: a complete Console developed in CSharp that let you interecep functions of any process and create hooks in a executed process from the Console (you can execute functions before starting the process). Functions are displayed with full parameter information. It displays function calls with full information about the parameters, fields of the structures are expanded and call stack information. Code is in only one file and the important staff is inside the OnFunctionCalled handler Deviare_OnFunctionCalled. .Net 3.5 required.

DeviareOutlookAddin: Interception of COM interfaces of Outlook objects.

DeviareVB: Example of using Nektra Deviare in VB.

LocalHookSimple: Small example of using Nektra Deviare to hook current process.

Python: Examples in Python that intercept DirectSound in order to capture sound.

Support:

Visit Nektra Forum to ask any question related to Nektra Deviare.



Developed by Nektra Advanced Computing