Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Malware
Search - Malware - List
DL : 0
反病毒、反间谍软件(木马)专题为了让大家对计算机病毒及其产生的危害有更多了解,具备基本的反病毒知识,我们特制作了这期反病毒、反流氓软件专题-anti-virus, Anti-spyware (malware) in order for the topic of computer viruses and the harm is more understanding, have basic anti-virus knowledge, we made a special edition of anti-virus and anti- rogue software feature
Date : 2025-07-16 Size : 8kb User : 付联榕

恶意代码机理与防范技术研究,一篇非常好的博士毕业论文,对于恶意代码讲解全面而有深度,对于恶意代码研究很有帮助,.nh格式,使用CAJViewer打开-Mechanism and prevention of malicious code technology research, a very good Ph.D. thesis, for malicious code on a comprehensive and deep, very helpful for the study of malicious code,. Nh format, the use of open CAJViewer
Date : 2025-07-16 Size : 6.11mb User : wn

DL : 0
武汉大学恶意代码课程资料 (全国最好的信息安全专业课程)
Date : 2025-07-16 Size : 3.08mb User : van

ESCAN源代码 ESCAN是一个完全设计和研发来保护个人计算机免于各类威胁(像是病毒、间谍软件、广告软件、恶意软件、按键记录程序、黑客程序、垃圾邮件软件、隐私权问题、令人厌恶的内容..等等)的专业软件-Escan Escan source code is a completely designed and developed to protect personal computers from all types of threats (such as viruses, spyware, adware, malware, keyloggers, hackers program, spam software, privacy issues, it is Offensive content .. etc.) the professional software
Date : 2025-07-16 Size : 351kb User : yingzs04

DL : 1
计算机病毒与木马缝隙的书,是一本分析病毒数据及程序结构的好书籍-Computer viruses and Trojan horses book gap is an analysis of HIV data and program structure of a good book
Date : 2025-07-16 Size : 6.67mb User : 20070303

DL : 0
计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
Date : 2025-07-16 Size : 19kb User : 胡锦涛

DL : 0
spy proxy is an agent based detection of malicious web content it protect the users from internet borne malware
Date : 2025-07-16 Size : 302kb User : mehala

These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very hard to find them now adays..these are extremely helpfull for people working in Malware analysis and malicious code analysis
Date : 2025-07-16 Size : 1.16mb User : asif

见包名字就知道是什么了哦,对ENG好的人来说就是好东西-Although they have been around for quite some time, rootkits have become somewhat of a buzzword in the security industry over the past year. While rootkits have traditionally been used by sophisticated attackers to hide their presence on compromised machines, recent worms, viruses, and trojans have started using them to complicate efforts to detect and clean infected machines. Microsoft recently reported that over twenty percent of the malware found by their malicious code removal tool on Windows XP Service Pack 2 machines contained rootkit technology [1]. By hiding the infection, rootkits allow the malicious software to remain on the system for a longer period of time. This enables the malicious software to steal more information, send out more spam, launch more DDOS attacks, and ultimately make more money for whoever is controlling it. Even some commercial software has adopted techniques used by rootkits for protection. The most famous example of this is the Sony Digital Ri
Date : 2025-07-16 Size : 675kb User : fdef

A Book About Malware
Date : 2025-07-16 Size : 319kb User : 李想

恶意程序源代码,让c_time 崩溃,使系统无限注销,仅用于学习-A malware sourcecode,only for study
Date : 2025-07-16 Size : 29kb User : leeyun

根据tommsoft提供的恶意软件清理工具提供的开发包,汉化整理而成,由于上次失误,没有发源代码,特重新发出! -According to tommsoft malware provided by the development of clean-up tool bag, finished order made that since the previous errors, there is no origin code, special re-issue!
Date : 2025-07-16 Size : 514kb User : laozuo007

search file list and view malware database
Date : 2025-07-16 Size : 963kb User : icelon

流氓软件扫面与清除源码 运行平台: Windows -Malware scanning and removal source operating platforms: Windows
Date : 2025-07-16 Size : 182kb User : zhengjie123

DL : 0
1- Malware is an abbreviation of malicious software which includes Trojans, viruses, worms, 2- Virus properties: a. Code portion that requires a host software (it infects other software and live on them) b. Requires a trigger (human action execution) to activate them. c. Has three main tasks: hiding, infection, damage (or job) d. It can change it’s shape/behavior to evade antiviruses.
Date : 2025-07-16 Size : 13kb User : mhdjamal

Reverse Engineering Code with IDA Pro IDA Pro 是一个世界顶级的交互式反汇编工具,它的使用者囊括了软件安全专家,军事工业,国家安全信息部门,逆向工程学者,黑客。从功能上它大大胜过了w32dasm。近来它的盗版已经在网上传播开了,你可以很轻松得到它。 -IDA is one of the most popular debugging tools for Windows. First, IDA Pro is a disassembler, in that it shows the assembly code of a binary. It also comes with advanced features that try to make understanding the assembly code as easy as possible. Second, it is also a debugger, in that it allows the user to step through the binary file to determine the actual instructions being executed, and the sequence in which the execution occurs. IDA Pro is widely used for malware analysis and software vulnerability research, among other purposes.
Date : 2025-07-16 Size : 3.58mb User : huangkeqiang

This book is divided into two parts, with the first being “Mobile Application Platforms” (Chapters 2 through 8). These chapters discuss the major operating system platforms on mobile devices, including Google’s Android, Apple’s iPhone, Windows Mobile, RIM BlackBerry, J2ME, and Symbian. These chapters strictly discuss how to use the platforms to build secure applications. For example, they address many of the items in the top 15 list discussed in Chapter 1, including secure storage, application isolation, and malware threads. These chapters should be considered a “how-to” guide for application developers who are interested in leveraging the security models of each platform.
Date : 2025-07-16 Size : 3.69mb User : guosong

DL : 0
随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、木马、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data. Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
Date : 2025-07-16 Size : 2.85mb User : ZYM

DL : 0
自己写得木马转移程序。自动查找Malware.QVM14.GEN木马,并把它转移到E:\bak目录下。-Trojan shift their written procedures. Automatically find Malware.QVM14.GEN Trojans, and to transfer it to E: \ bak directory.
Date : 2025-07-16 Size : 13kb User : 特殊台

Anatomy of Stealt Malware, very good
Date : 2025-07-16 Size : 230kb User : MUTANT
« 12 3 4 5 6 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.