CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - Malware
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Search - Malware - List
[
Other
]
zhuanti
DL : 0
反病毒、反间谍软件(木马)专题为了让大家对计算机病毒及其产生的危害有更多了解,具备基本的反病毒知识,我们特制作了这期反病毒、反流氓软件专题-anti-virus, Anti-spyware (malware) in order for the topic of computer viruses and the harm is more understanding, have basic anti-virus knowledge, we made a special edition of anti-virus and anti- rogue software feature
Date
: 2025-12-25
Size
: 8kb
User
:
付联榕
[
Other
]
malware
DL : 1
计算机病毒与木马缝隙的书,是一本分析病毒数据及程序结构的好书籍-Computer viruses and Trojan horses book gap is an analysis of HIV data and program structure of a good book
Date
: 2025-12-25
Size
: 6.67mb
User
:
20070303
[
Other
]
Malware
DL : 0
1- Malware is an abbreviation of malicious software which includes Trojans, viruses, worms, 2- Virus properties: a. Code portion that requires a host software (it infects other software and live on them) b. Requires a trigger (human action execution) to activate them. c. Has three main tasks: hiding, infection, damage (or job) d. It can change it’s shape/behavior to evade antiviruses.
Date
: 2025-12-25
Size
: 13kb
User
:
mhdjamal
[
Other
]
ReverseEngineeringCodewithIDAPro
DL : 0
Reverse Engineering Code with IDA Pro IDA Pro 是一个世界顶级的交互式反汇编工具,它的使用者囊括了软件安全专家,军事工业,国家安全信息部门,逆向工程学者,黑客。从功能上它大大胜过了w32dasm。近来它的盗版已经在网上传播开了,你可以很轻松得到它。 -IDA is one of the most popular debugging tools for Windows. First, IDA Pro is a disassembler, in that it shows the assembly code of a binary. It also comes with advanced features that try to make understanding the assembly code as easy as possible. Second, it is also a debugger, in that it allows the user to step through the binary file to determine the actual instructions being executed, and the sequence in which the execution occurs. IDA Pro is widely used for malware analysis and software vulnerability research, among other purposes.
Date
: 2025-12-25
Size
: 3.58mb
User
:
huangkeqiang
[
Other
]
Mobile.Application.Security.McGraw.Hill.2010-1
DL : 0
This book is divided into two parts, with the first being “Mobile Application Platforms” (Chapters 2 through 8). These chapters discuss the major operating system platforms on mobile devices, including Google’s Android, Apple’s iPhone, Windows Mobile, RIM BlackBerry, J2ME, and Symbian. These chapters strictly discuss how to use the platforms to build secure applications. For example, they address many of the items in the top 15 list discussed in Chapter 1, including secure storage, application isolation, and malware threads. These chapters should be considered a “how-to” guide for application developers who are interested in leveraging the security models of each platform.
Date
: 2025-12-25
Size
: 3.69mb
User
:
guosong
[
Other
]
sample
DL : 0
恶意软件分析诀窍,主要描写如何分析恶意软件,以及常用的技巧和对抗方案-Malware analysis know-how, the main description of how to analyze malware, as well as the commonly used techniques and combat programs
Date
: 2025-12-25
Size
: 4.04mb
User
:
赵馗喃
[
Other
]
Practical_Malware_Analysis
DL : 0
a practical malware analysis book
Date
: 2025-12-25
Size
: 8.84mb
User
:
[
Other
]
3
DL : 0
Volume issue 2013 [doi 10.1007_978-3-642-37300-8_7] Y. Wu R. H. C. Yap -- Experiments with Malware Visualization.pdf- Volume issue 2013 [doi 10.1007_978-3-642-37300-8_7] Y. Wu R. H. C. Yap -- Experiments with Malware Visualization.pdf
Date
: 2025-12-25
Size
: 2.64mb
User
:
unknown2
[
Other
]
Practical-Malware-Analysis_-The-Hands-On-Guide-to
DL : 0
Written by Sikorski, Michael & Honig, Andrew This is not a book on how to find malware. Our focus is on how to analyze malware once it has been found. We focus on malware found on the Windows operating system — by far the most common operating system in use today — but the skills you learn will serve you well when analyzing malware on any operating system. We also focus on executables, since they are the most common and the most difficult files that you’ll encounter. At the same time, we’ve chosen to avoid discussing malicious scripts and Java programs. Instead, we dive deep into the methods used for dissecting advanced threats, such as backdoors, covert malware, and rootkits.
Date
: 2025-12-25
Size
: 12.06mb
User
:
Leganola Aston
[
Other
]
documents
DL : 0
this documents describes Malware behavior and Malware Analysis
Date
: 2025-12-25
Size
: 52.21mb
User
:
Maryam
[
Other
]
alternative-ncd-lzjd
DL : 0
The Normalized Compression Distance (NCD) has been used in a number of domains to compare objects with varying feature types. This exibility comes from the use of general purpose compression algorithms as the means of computing distances between byte sequences. Such exibility makes NCD particularly attractive for cases where the right features to use are not obvious, such as malware classication. However, NCD can be computationally demanding, thereby restricting the scale at which it can be applied. We introduce an alternative metric also inspired by compression, the Lempel-Ziv Jaccard Distance (LZJD). We show that this new distance has desirable theoretical properties, as well as comparable or superior performance for malware classication, while being easy to implement and orders of magnitude faster in practice
Date
: 2023-03-12
Size
: 586.29kb
User
:
pavlest
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.