Welcome![Sign In][Sign Up]
Location:
Search - backdoor

Search list

[Internet-Networkntshell核心代码

Description: 内核级后门程序ntshell核心代码-kernel-level backdoor ntshell core code
Platform: | Size: 2048 | Author: 校风 | Hits:

[Windows DevelopDelphi版T-Cmd源码

Description: T-CMD 是一款用 C++ 编写的后门程序,网上已有 C++ 源码发布。 在本人学习 C++ 的时候,顺便把他翻译成了 Pascal 源码,突然感觉以前感到高深莫测的 C++ 也不那么可怕了。特贡献出来,给大家学习 C++ 和 Delphi 的时候,可以参考下代码之间的区别。-T-CMD C is a backdoor program preparation, online C source code has been released. In my learning C, the way he translated into Pascal source, suddenly feeling was previously inscrutable C not so terrible. Special contributions, and for everyone to learn C and Delphi, under the code can refer to the distinction between.
Platform: | Size: 16384 | Author: zesfl | Hits:

[Remote Controlopen3389

Description: 开启3389后门程序/c++,来源与其他网站-backdoor/c, sources and other sites
Platform: | Size: 1024 | Author: | Hits:

[Othersars_final.tar

Description: 一个用C语言写的后门程序,不知道这里有没有望版主通过-a C language to write the backdoor, I do not know here is not looking through the moderator
Platform: | Size: 10240 | Author: 陈思铭 | Hits:

[OtherHacker_Defender

Description: 内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。-backdoor kernel-level software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys keys, open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive.
Platform: | Size: 92160 | Author: | Hits:

[Firewall-Securitykillengine.ZIP

Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB/CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy-- defense network scanning the realization Computer Virus Scan Extraction
Platform: | Size: 505856 | Author: hulipeng | Hits:

[Othercgi_backdoor

Description: c语言编写的cgi后门!!! 好用得不得了-cgi back door! ! ! Very, very handy! !
Platform: | Size: 6144 | Author: 谢黎鹏 | Hits:

[Documentswordspy_src

Description: 现在的木马后门种类非常之多,其中有些木马专门以Office 文档为窃取目标,我最近做了一些Anti这些木马的工作,在工作中我基本上实现了阻止未知程序利用Office自动化接口窃取Word内容,但限于公司利益我只能写一些基本上已经比较成熟和公开的技术,当然其中了包含我的设计思想,我想多多少少会让你有所收获,你可任意转载文章,但请注明作者和出处,谢谢!-the backdoor Trojan so many types, Some Trojan specifically to steal Office documents, I have recently done some of these Trojan Anti work, at work I basically realized unknown procedures to prevent the use of Office Automation Interface theft Word, but limited to the interests of the company I can basically write some more mature and open technology, of course, which includes the design, I thought, I want to give you something to gain something, you can freely reproduced articles, but please indicate the source and author, thank you!
Platform: | Size: 16384 | Author: hello | Hits:

[OS programhoumenchengxu

Description: 这是一个不错的后门程序,大家可以看看,很适合 初学者阿~-This is a good backdoor program, we can see, is very suitable for beginners A ~
Platform: | Size: 68608 | Author: 张庆 | Hits:

[Hook apihoumenHook

Description:
Platform: | Size: 2222080 | Author: 李君一 | Hits:

[Internet-Networkbackdoordemo1.5

Description: 木马编程示例,VC/MFC实现,包括客户端和服务端的完整代码-Trojan programming examples, VC/MFC, including client and server code integrity
Platform: | Size: 67584 | Author: 忍者 | Hits:

[Remote ControlBabyface

Description: 作者:feng_911@sohu.com 一个后门程序 -Author : feng_911@sohu.com a backdoor procedure
Platform: | Size: 143360 | Author: 小李 | Hits:

[Internet-NetworkNetrojan

Description: 一个后门源码,可以实现文件管理,注册表管理等功能-a backdoor source, can achieve a document management, registry management, and other functions
Platform: | Size: 649216 | Author: allen | Hits:

[Internet-NetworkHgzVip1

Description: 一个后门源码,可以实现文件管理,注册表管理等功能-a backdoor source, can achieve a document management, registry management, and other functions
Platform: | Size: 1534976 | Author: allen | Hits:

[OS programaVirsHelpMe

Description: 一個用Delphi寫的後門程序,不要非法使用喲-a backdoor written procedures, not the illegal use of yo!
Platform: | Size: 246784 | Author: Learn | Hits:

[Internet-Networkbackdoor1and1

Description: 后门,反响连接+正向连接后门,cmd+下载功能。-backdoor+ positive repercussions link connecting the back door, cmd+ download function.
Platform: | Size: 22528 | Author: | Hits:

[Internet-Network050414t-cmd

Description: 服务级后门T-Cmd源代码,值的学习,推荐下载-service-level backdoor T-interpreter source code and the value of the study, to download
Platform: | Size: 8192 | Author: pangguigao | Hits:

[Otherdoor

Description: 木马后门,它就是个木马后门,木马 木马 -Backdoor Trojan, it is a backdoor Trojan horse, Trojan horse
Platform: | Size: 1205248 | Author: | Hits:

[Remote ControlICMP

Description: icmp协议的后门,采用无连接协议.不开端口不容易查杀-protocol icmp backdoor, using connectionless protocol. not open port is not easy killing
Platform: | Size: 31744 | Author: wangyan | Hits:

[OS programRCtl

Description: 结合T-PSKIT/T-CMD 一个系统服务级后门 可在获取远程机器管理员账号后在远程机安装 支持登陆口令、远程机器信息枚举,修改,远程桌面捕获等-Combined with a system service level T-PSKIT/T-CMD backdoor access to remote machine in the administrator account on the remote machine after the installation to support landing password, remote machine information enumerate, modify, such as Remote Desktop Capture
Platform: | Size: 605184 | Author: mars | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 21 »

CodeBus www.codebus.net