_ _ _ _
| | | | (_) | |
| |__ ___ ___ | | ___ _ __ __ _| |_ ___ _ __
| '_ \ / _ \ / _ \| |/ / | '_ \ / _` | __/ _ \| '__|
| | | | (_) | (_) | <| | | | | (_| | || (_) | |
|_| |_|\___/ \___/|_|\_\_|_| |_|\__,_|\__\___/|_|
A Deviare-based tool to hook and manipulate WinAPI calls. It is useful to understand and hijack API calls perfomed by a program. You can use hookinator in Malware Analysis to avoid API-based evasion techniques and to allow the complete detonation of the malware.
The current hooked WinAPIs are defined into hooksDictionary.py file.
- Works only with Python27
-
download deviare release: https://github.com/nektra/Deviare2/releases/download/v2.8.3/Deviare.2.8.3.zip
-
execute the command:
regsvr32 DeviareCOM.dllorregsvr32 DeviareCOM64.dll -
download hookinator-master
-
install hookinator dependencies using the requirements.txt file: pip install -r requirements.txt
-
execute hookinator: python hookinator.py
-
Select the file you want to launch and to monitor
-
View intercepted APIs in prompt