madCodeHook Reference 

www.madshi.net
Uses
madDisAsm
madRemote
madRipeMD
madStrings
madTools
madTypes
Windows
Routines
AddAccessForEveryone
AmSystemProcess
AmUsingInputDesktop
AnsiToWide
CollectHooks
CreateGlobalEvent
CreateGlobalFileMapping
CreateGlobalMutex
CreateIpcQueue
CreateProcessExA
CreateProcessExW
CreateProcessEx
DestroyIpcQueue
FlushHooks
GetCallingModule
GetCurrentSessionId
GetInputSessionId
HookAPI
HookCode
InjectLibraryA
InjectLibraryW
InjectLibrary
InstallInjectionDriver
IsHookInUse
IsInjectionDriverInstalled
IsInjectionDriverRunning
LoadInjectionDriver
OpenGlobalEvent
OpenGlobalFileMapping
OpenGlobalMutex
ProcessIdToFileNameA
ProcessIdToFileNameW
ProcessIdToFileName
RegisterUninjectCallback
RenewHook
SendIpcMessage
SetMadCHookOption
StartInjectionDriver
StopInjectionDriver
UnhookAPI
UnhookCode
UninjectAllLibrariesA
UninjectAllLibrariesW
UninjectAllLibraries
UninjectLibraryA
UninjectLibraryW
UninjectLibrary
UninstallInjectionDriver
WideToAnsi
Types
TInjectApprovalCallbackRoutine
TIpcCallback
TUninjectCallback
Consts
ALL_SESSIONS
ALLOW_WINSOCK2_MIXTURE_MODE
DISABLE_CHANGED_CODE_CHECK
DISABLE_LDR_LOAD_DLL_SPECIAL_HOOK
DISABLE_PARALLEL_DLL_LOADING
DONT_TOUCH_RUNNING_PROCESSES
FOLLOW_JMP
HOOK_LOAD_LIBRARY
INJECT_INTO_RUNNING_PROCESSES
LIMITED_IPC_PORT
MIXTURE_MODE
NO_MIXTURE_MODE
NO_SAFE_UNHOOKING
RENEW_OVERWRITTEN_HOOKS
SAFE_HOOKING
SET_INTERNAL_IPC_TIMEOUT
TARGET_PROCESS_IS_64BIT
TARGET_PROCESS_IS_ELEVATED
TARGET_PROCESS_IS_NEWLY_CREATED
TARGET_PROCESS_IS_PROTECTED
TARGET_PROCESS_IS_SYSTEM
UNINJECT_FROM_RUNNING_PROCESSES
CURRENT_SESSION
USE_OLD_IPC_LOGIC
X86_ALLOCATION_ADDRESS