Welcome![Sign In][Sign Up]
Location:
Search - hiding process

Search list

[Process-ThreadNT下进程隐藏

Description: 在NT环境下隐藏进程,也就是说在用户不知情的条件下,执行自己的代码的方法有很多种,比如说使用注 册表插入DLL,使用Windows挂钩等等。其中比较有代表性的是Jeffrey Richer在《Windows核心编程》中 介绍的LoadLibrary方法和罗云彬在《Windows环境下32位汇编语言程序设计》中介绍的方法。两种方法的 共同特点是:都采用远程线程,让自己的代码作为宿主进程的线程在宿主进程的地址空间中执行,从而达 到隐藏的目的。相比较而言,Richer的方法由于可以使用c/c++等高级语言完成,理解和实现都比较容易 ,但他让宿主进程使用LoadLibrary来装入新的DLL,所以难免留下蛛丝马迹,隐藏效果并不十分完美。罗 云彬的方法在隐藏效果上绝对一流,不过,由于他使用的是汇编语言,实现起来比较难(起码我写不了汇 编程序:))。笔者下面介绍的方法可以说是对上述两种方法的综合:采用c/c++编码,实现完全隐藏。并 且,笔者的方法极大的简化了远程线程代码的编写,使其编写难度与普通程序基本一致。-the NT environment hidden process, the user is unaware of the conditions, the implementation of their code There are various ways, for instance, the use of the registry into DLL, etc. linked to the use of Windows. The more representative Jeffrey Richer is the "core Windows programming" introduced by the LoadLibrary method and the Luo Bin, "under Windows 32 assembly language programming" introduced by the method. Two methods are common features are : remote threads are used to keep the code as host process threads in the host address space of the process to implement in order to achieve the purpose of hiding. Comparatively speaking, Richer way can be used as c / c Senior complete language, understanding and will be relatively easy to achieve, but he let the host process
Platform: | Size: 32284 | Author: 潘桂聪 | Hits:

[OS programFDiskThief_code

Description: 实现了在任务管理器中的进程隐藏 处理WM_DEVICECHANGE消息代替定时器,提高查找闪盘效率 这是一个可以在后台偷取你闪盘里所有资料的小软件。 只要你的闪盘(如U盘,mp3)一插上,所有的东东都被悄悄拷走.代码开放,可以热键呼出. 点[开始]->[隐藏],就可以工作了.Alt+X呼出.-realization of the mission management for the process of hiding information processing WM_DEVICECHANGE replace timers, to improve search efficiency flash it to be a steal in the background you flash Lane all the information to a PC. As long as your flash (USB mp3), a battered, all the Eastern residences have been quietly away. Open source can hotkey exhaled. Points [started] - gt; [Hidden], it can work. Alt X exhaled.
Platform: | Size: 38592 | Author: 东南 | Hits:

[Hook apiDetection_of_the_hidden_processes

Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: | Size: 15915 | Author: inwing | Hits:

[Hook apihideprocess

Description: 2000下进程隐藏的一种方案的例子-2000 under the process of hiding a program example
Platform: | Size: 20480 | Author: kyao | Hits:

[Hook apiDetection_of_the_hidden_processes

Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: | Size: 15360 | Author: inwing | Hits:

[OS programnewsys

Description: Windows driver backdoor Tdi driver.use port hidding,process hiding.-Windows driver backdoor Tdi driver.use po rt hidding, process hiding.
Platform: | Size: 1423360 | Author: 亡命 | Hits:

[Special EffectsLSB

Description: 最低有效位嵌入水印的matlab程序,比较基础的,希望对给位有用。-Least significant bit of matlab watermark embedding process, the basis of comparison, in the hope that useful to the bit.
Platform: | Size: 4096 | Author: 杨霞 | Hits:

[Driver DevelopProcessAndFileHider

Description: 实现了隐藏进程,使进程对任务管理器和进程查看器均不可见,使文件对资源管理器不可见 是驱动编程入门的好例子-Implement hiding process, make process invisible to task manager and process explorer and enable files invisible for windows explorer, it is a perfect example for driver programming.
Platform: | Size: 543744 | Author: kaige | Hits:

[Driver DevelopCode

Description: Hiding process with DKOM !采用断开系统中进程的双向链表方式,隐藏指定进程。本程序采用了硬编码,所以只能隐藏XP的进程,如果是其他系统需要修改编码地址!-Hiding process with DKOM! Disconnect system using two-way linked list in the process of the way, hidden designation process. This procedure uses hard-coded, so can only hide the process of XP, if other systems are necessary to amend the code address!
Platform: | Size: 3072 | Author: 隔夜茶 | Hits:

[Windows DevelopSteganogra188368522005

Description: steganography method of sending message by the process of information hiding
Platform: | Size: 882688 | Author: Jami | Hits:

[Driver Developodfgl3mn2scenwnach

Description: very comprehensive example, windows WDM driver development ex The use of drive technology can s Say all ?� � e full speed equipm STM32 DAC DMA TIXINGBO Implement hiding process, make pr dma ddk driver
Platform: | Size: 5120 | Author: Kamelin | Hits:

[Booksnc110_NetCat

Description: very comprehensive example, windows WDM driver development ex The use of drive technology can s Say all � � e full speed equipm STM32 DAC DMA TIXINGBO Implement hiding process, make pr dma ddk driver
Platform: | Size: 75776 | Author: Kamelin | Hits:

[Process-Threadmyhide

Description: DKOM 隐藏进程 直接系统内核修改 断开FLINK链表-DKOM process hiding
Platform: | Size: 31744 | Author: qiuliyin | Hits:

[Crack Hacklow

Description: 基于最低有效位的图像信息隐藏 图像信息隐藏: 说明: 1、bmp格式的原始图像都有足够的容量来嵌入任何格式的隐秘文件,而且都可以提取成功。 2、jpg格式的原始图像只有足够的容量来嵌入任何格式的小容量隐秘文件,可以提取成功。 3、嵌入过程:i. 打开一幅原始图像;ii. 点击相应的嵌入方法;iii. 在提示中输入要嵌入的隐秘文件路径;iv. 输入要保存隐秘文件的路径;v. 嵌入成功; 4. 提取过程:i. 打开一幅隐秘图像;ii. 点击相应的提取算法;iii. 输入要保存隐秘文件的路径;iv. 提取成功。-Based on the least significant bit of image information hiding Image Information Hiding: Description: 1, bmp format of the original image will have sufficient capacity to embed the hidden files in any format, and can be successfully extracted. 2, jpg format of the original image is only enough capacity to embed in any format of the small capacity of secret documents, can be extracted successfully. 3, embedded in the process of: i. opening a piece of the original image ii. Click on the corresponding embedding method iii. At the prompt, enter the secret document to be embedded in the path iv. Input to preserve the path of secret documents v. embedding success 4. Extraction process: i. Open a hidden image ii. Click on the corresponding extraction algorithm iii. Input to preserve the path of secret documents iv. Extract.
Platform: | Size: 67584 | Author: Yummy | Hits:

[matlabche

Description: 一个简单的信息隐藏程序,Contraband Hell Edition(CHE)-A simple information hiding process, Contraband Hell Edition (CHE)
Platform: | Size: 862208 | Author: dragon | Hits:

[Windows DevelopSoftManger2rd

Description: 个人偏好软件查看,进程查看,进程隐藏,进程删除-Personal preference software to view, process view, process hiding, process delete
Platform: | Size: 21523456 | Author: 李万雷 | Hits:

[Picture ViewerInfoInImg

Description: 信息隐藏处理 可以用DES加密 可以实现信息的隐藏加密-Information hiding process can use the DES encryption which information can be hidden
Platform: | Size: 4177920 | Author: paul | Hits:

[Hook apiHideProcess

Description: 隐藏进程的驱动源码.我就说这么多,应该有20个字了吧-A simple driver source code for hiding process.
Platform: | Size: 73728 | Author: iHunks | Hits:

[Multimedia DevelopLSB-Hiding

Description: LSB Hiding : Advanced encryption standard (AES) that has been proposed by National Institute of Standards and Technology (NIST) plays a significant role of a secure algorithm for data exchanged. Two prime processes involved: encryption (cipher) and decryption (decipher). Cipher is a process to convert data into unintelligent form called ciphertext. Similarly decipher is a process for the data to be converted back into its original form called paintext.
Platform: | Size: 1024 | Author: muthana | Hits:

[Windows DevelopProcess-hiding

Description: 进程隐藏工具集成了窗口隐藏老板键、文件隐藏软件、进程隐藏软件的主要功能,操作方便、功能实用。其独有的开机自动隐藏功能可轻松实现BT、eMule、迅雷等工具自动隐藏下载。亦是上班族在上网、玩游戏、炒股时用来快速隐藏窗口及隐藏图标的最佳工具。-Hidden process tool integrates hide window boss key, hide file software, processes hidden software' s main functions, ease of operation, functional and practical. Its unique power auto-hide feature can be easily achieved BT, eMule, Thunder and other tools to automatically hide the download. Workers also in the Internet, play games, when stocks the best tools to quickly hide a window and hide icons used.
Platform: | Size: 1344512 | Author: kaikai | Hits:
« 12 3 4 »

CodeBus www.codebus.net