Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - virus
Search - virus - List
QQ尾巴病毒的Visual C++实现,仅作为学习和交流之用-QQ tail Visual C virus achieved only as a learning and the exchange of use
Date : 2008-10-13 Size : 1.76kb User : 栾佳

DL : 0
API calls interception is the task that allows you to get access to some parts of others programs. Lots of programmers spend time developing and describing various methods that allow that access. Such methods are used in many anti-virus and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I spent much time finding and understanding the technique of interception. I would like to describe the results of my research.-API calls interception is the task that all boasting you to get access to some parts of others prog rams. Lots of programmers spend time developin g and describing various methods that allow tha t access. Such methods are used in many anti-vir us and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I s pent much time finding and understanding the te TECHNIQUE of interception. I would like to descri be the results of my research.
Date : 2008-10-13 Size : 19.37kb User : 李登煇

DL : 0
模拟QQ尾巴病毒制作的MyQQTail程序,非常适合大家学习钩子的使用-simulation produced by the virus MyQQTail procedures, we are very suitable for studying the use of hook
Date : 2008-10-13 Size : 12.77kb User : lj

DL : 0
刘麻子病毒的DELPHI源代码,研究一下,大家别搞破坏啊-Liumazi virus Delphi source code, look, no one will carry out sabotage ah
Date : 2008-10-13 Size : 161.36kb User : chene

这是一个写PE文件病毒的教程,里面有详细的过程,以及函数,是一个高级黑客必备的技能,从现在开始你也就能掌握了-This is a written document PE virus Guide, which detailed the process and function, Hacker is a senior essential skills, from now on you will be able to grasp the
Date : 2008-10-13 Size : 3.4kb User : 于军亮

利用hook技术关闭第三方程序的窗口,比如某些杀毒软件的警告窗口:)-use hook technical procedures for the closure of a window of a third party, such as certain anti-virus software warned window :)
Date : 2008-10-13 Size : 178.03kb User : xxxxxxxx

DL : 0
感染exe运行DLL 病毒技术-infection exe running DLL virus technology
Date : 2008-10-13 Size : 40kb User : 123456789

DL : 0
PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted.
Date : 2008-10-13 Size : 109.87kb User : 王峰

PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted
Date : 2008-10-13 Size : 109.87kb User : 万惠华

DL : 0
PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted.
Date : 2025-12-17 Size : 110kb User : 王峰

PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted
Date : 2025-12-17 Size : 110kb User :

QQ尾巴病毒的Visual C++实现,仅作为学习和交流之用-QQ tail Visual C virus achieved only as a learning and the exchange of use
Date : 2025-12-17 Size : 2kb User : 栾佳

DL : 0
API calls interception is the task that allows you to get access to some parts of others programs. Lots of programmers spend time developing and describing various methods that allow that access. Such methods are used in many anti-virus and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I spent much time finding and understanding the technique of interception. I would like to describe the results of my research.-API calls interception is the task that all boasting you to get access to some parts of others prog rams. Lots of programmers spend time developin g and describing various methods that allow tha t access. Such methods are used in many anti-vir us and anti-spyware applications. Besides, sometimes, intercepting can help you to find errors in your application. However, it is not a secret that some viruses use it too. I s pent much time finding and understanding the te TECHNIQUE of interception. I would like to descri be the results of my research.
Date : 2025-12-17 Size : 74kb User : 李登煇

DL : 0
模拟QQ尾巴病毒制作的MyQQTail程序,非常适合大家学习钩子的使用-simulation produced by the virus MyQQTail procedures, we are very suitable for studying the use of hook
Date : 2025-12-17 Size : 13kb User : lj

DL : 0
刘麻子病毒的DELPHI源代码,研究一下,大家别搞破坏啊-Liumazi virus Delphi source code, look, no one will carry out sabotage ah
Date : 2025-12-17 Size : 161kb User : chene

利用hook技术关闭第三方程序的窗口,比如某些杀毒软件的警告窗口:)-use hook technical procedures for the closure of a window of a third party, such as certain anti-virus software warned window :)
Date : 2025-12-17 Size : 178kb User : xxxxxxxx

DL : 1
感染exe运行DLL 病毒技术-infection exe running DLL virus technology
Date : 2025-12-17 Size : 40kb User :

DL : 0
PE文件是windows(95/98/NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。 -PE file is windows (95/98/NT) is currently used in the executable file format. CIH virus is prevalent PE by changing the contents of the file, and keep the file size unchanged, and thus realize their functions. This procedure by analyzing the PE file format, the executable file to re-positioning table positioning, pointing users to the preparation of the DLL, and then return to normal call instruction pointer location. Adopted in the DLL system linking all levels realize the background of the intercepted password function.
Date : 2025-12-17 Size : 63kb User : sujun

基于api hook技术的未知病毒检测工具,可以用来学习。使用api hook工具获取刻意进程的api 序列,以api短序为特征输入svm进行识别。-Api hook technique based on the unknown virus detection tool to learn. Tools for use api hook api deliberate process sequence to a short sequence featuring api import svm for recognition.
Date : 2025-12-17 Size : 6.9mb User : 卜少锋

源码Virus 9901315IE28442的功能模块还是很强大的,今天分享给大家学习探讨-Source Virus get- 9901315 ie28442 function module is very strong, today to share with everybody to learn
Date : 2025-12-17 Size : 2kb User : lmb904728
« 12 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.