Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Malware
Search - Malware - List
恶意程序源代码,让c_time 崩溃,使系统无限注销,仅用于学习-A malware sourcecode,only for study
Date : 2025-12-25 Size : 29kb User : leeyun

search file list and view malware database
Date : 2025-12-25 Size : 963kb User : icelon

在Windows内部存储空间内对Malware进行分析-This document presents insights from extensive reverse engineering efforts of the memory management mechanisms of Windows XP. The focus lies on the mechanisms which are used to map executable modules into the address space and the role of the page fault handler in this context.
Date : 2025-12-25 Size : 377kb User : rengood

Anatomy of Stealt Malware, very good
Date : 2025-12-25 Size : 230kb User : MUTANT

ESCAN源代码ESCAN是一个完全设计和研发来保护个人计算机免于各类威胁(像是病毒、间谍软件、广告软件、恶意软件、按键记录程序、黑客程序、垃圾邮件软件、隐私权问题、令人厌恶的内容..等等)的专业软件Escan Escan source code is a completely designed and developed to protect personal computers from all types of threats (such as viruses, spyware, adware, malware, keyloggers, hackers program, spam software, privacy issues, it is Offensive content .. etc.) the professional software-Escan Escan source code is a completely designed and developed to protect personal computers from all types of threats (such as viruses, spyware, adware, malware, keyloggers, hackers program, spam software, privacy issues, it is Offensive content .. etc.) the professional software
Date : 2025-12-25 Size : 351kb User : ntlas

how to bypass the Operating System’s normal input/output (I/O) disk driver path and use the crash dump driver stack (i.e., “crash dump I/O path”) to read the master boot record (MBR). This technique subverted the TDL4 rootkit and would be effective against any traditional I/O hooking rootkit/malware.
Date : 2025-12-25 Size : 39kb User : maysam

Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA database) using IDA s powerful Appcall feature. krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to the function using Appcall, this is most useful in analyzing a malware binary with encryption.-Krypton is an IDA Plugin that assists one in reverse engineering x86 binary executables, by executing a function IDB (IDA database) using IDA s powerful Appcall feature. krypton takes xrefs a given function (say a possible decoder) to find all function calls to it and then parses and finds the parameters use (including prototype, no of arguments, and the arguments themselves) instructions and uses them to the function using Appcall, this is most useful in analyzing a malware binary with encryption.
Date : 2025-12-25 Size : 491kb User : Srinivas

邹小鹏爱邹琪修复工具 打印店 WORd修复工具(Zou Xiaopeng loves Zou Qi repair tool print shop malware)
Date : 2025-12-25 Size : 13kb User : wai&sha

用于特征定位 可以定位出白文件恶意程序位置很详细很使用(A feature location can be used to locate the white file malware location in detail and in use)
Date : 2025-12-25 Size : 1.05mb User : qqqq2
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.