Jason Hood 05e765c881 Fix buffer overflow
Turns out testing for an empty buffer outside the critical section
wasn't a good idea (testing in a virtual 10 started the thread between
the test and enter, causing buffer overflow in the small loop).
2017-12-26 18:43:56 +10:00
2010-11-15 21:51:38 +10:00
2017-12-26 18:43:56 +10:00
2017-12-26 16:47:08 +10:00
2017-11-21 11:46:58 +10:00
2011-03-03 17:23:45 +10:00
2017-11-29 11:42:47 +10:00
2017-10-26 12:58:17 +10:00
2017-11-21 11:46:58 +10:00
2017-07-25 18:18:34 +10:00
2017-10-26 12:58:17 +10:00
2017-12-23 22:04:44 +10:00
2017-12-26 18:43:56 +10:00
2017-12-23 16:44:32 +10:00
2017-07-25 18:18:34 +10:00
2017-12-26 16:47:08 +10:00

ANSICON Latest release

ANSICON provides ANSI escape sequences for Windows console programs. It provides much the same functionality as ANSI.SYS does for MS-DOS.

Requirements

  • 32-bit: Windows 2000 Professional and later (it won't work with NT or 9X).
  • 64-bit: AMD64 (it won't work with IA64).

How it Works

ANSICON injects a DLL into a process, hooking its functions.

Injection

One of three methods is used to inject the DLL.

  • LoadLibrary via CreateRemoteThread for a running process.

  • LdrLoadDll via CreateRemoteThread for a 64-bit .NET AnyCPU process.

  • Adding the DLL directly to the import table, otherwise.

Hooking

Hooking is achieved by modifying import addresses, or the return value of GetProcAddress.

Description
No description provided
Readme 522 KiB
v1.89 Latest
2025-01-21 16:37:28 +08:00
Languages
C 99.7%
Batchfile 0.3%