Yep, he's looking for a solution to just inject the code inside another process to intercept/hook the creation of another process.
Speaking about hiding from rk unhookers, hiding the hooks from kernel-mode from ring3 is 100% impossible due to the fact there's no way to neither forging memory nor forge false file content for a ring3 application. The only way to prevent kernel mode based antirootkit from usermode based app is to prohibit them to load their drivers ( via hooking, monitoring creating file/writing file and some other hardcore methods but it will take too long to mention them there ).
crim, do you have ICQ?
93 - 88 - 73 - 00, but i rarely have time to get online though