madCodeHook Reference 

www.madshi.net
Uses
madDisAsm
madRemote
madRipeMD
madStrings
madTools
madTypes
Windows
Routines
AddAccessForEveryone
AmSystemProcess
AmUsingInputDesktop
AnsiToWide
CollectHooks
CreateGlobalEvent
CreateGlobalFileMapping
CreateGlobalMutex
CreateIpcQueue
CreateProcessExA
CreateProcessExW
CreateProcessEx
DestroyIpcQueue
FlushHooks
GetCallingModule
GetCurrentSessionId
GetInputSessionId
HookAPI
HookCode
InjectLibraryA
InjectLibraryW
InjectLibrary
InstallInjectionDriver
IsHookInUse
IsInjectionDriverInstalled
IsInjectionDriverRunning
LoadInjectionDriver
OpenGlobalEvent
OpenGlobalFileMapping
OpenGlobalMutex
ProcessIdToFileNameA
ProcessIdToFileNameW
ProcessIdToFileName
RegisterUninjectCallback
RenewHook
SendIpcMessage
SetMadCHookOption
StartInjectionDriver
StopInjectionDriver
UnhookAPI
UnhookCode
UninjectAllLibrariesA
UninjectAllLibrariesW
UninjectAllLibraries
UninjectLibraryA
UninjectLibraryW
UninjectLibrary
UninstallInjectionDriver
WideToAnsi
Types
TIpcCallback
TUninjectCallback
Consts
ALL_SESSIONS
ALLOW_WINSOCK2_MIXTURE_MODE
DISABLE_CHANGED_CODE_CHECK
DONT_COUNT
DONT_TOUCH_RUNNING_PROCESSES
FOLLOW_JMP
INJECT_INTO_RUNNING_PROCESSES
MIXTURE_MODE
NO_AUTO_UNHOOKING
NO_MIXTURE_MODE
NO_SAFE_UNHOOKING
RENEW_OVERWRITTEN_HOOKS
SAFE_HOOKING
SET_INTERNAL_IPC_TIMEOUT
UNINJECT_FROM_RUNNING_PROCESSES
CURRENT_SESSION
USE_OLD_IPC_LOGIC
X86_ALLOCATION_ADDRESS