Click here to Skip to main content
14,601,274 members

Intercepting Calls to COM Interfaces

Rate this:
4.90 (33 votes)
Please Sign up or sign in to vote.
4.90 (33 votes)
2 Feb 2011CPOL
In this article, I’m going to describe how to implement COM interface hooks.



Compare Revision Minor Date Status Editor
2 - publicly available No 9-Mar-11 2:23 Available Deeksha Shenoy
1 No 2-Feb-11 5:01 Composing


This article, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)


About the Authors

Apriorit Inc
Chief Technology Officer Apriorit Inc.
United States United States
ApriorIT is a software research and development company specializing in cybersecurity and data management technology engineering. We work for a broad range of clients from Fortune 500 technology leaders to small innovative startups building unique solutions.

As Apriorit offers integrated research&development services for the software projects in such areas as endpoint security, network security, data security, embedded Systems, and virtualization, we have strong kernel and driver development skills, huge system programming expertise, and are reals fans of research projects.

Our specialty is reverse engineering, we apply it for security testing and security-related projects.

A separate department of Apriorit works on large-scale business SaaS solutions, handling tasks from business analysis, data architecture design, and web development to performance optimization and DevOps.

Official site:
Clutch profile:
Group type: Organisation

33 members

Volodymyr Shamray
Software Developer (Senior) Apriorit Inc
Ukraine Ukraine
No Biography provided

Comments and Discussions

Tagged as


100 bookmarked