Welcome![Sign In][Sign Up]
Location:
Search - pe virus

Search list

[Hook apiPEBingBuZongJian

Description: 这是一个写PE文件病毒的教程,里面有详细的过程,以及函数,是一个高级黑客必备的技能,从现在开始你也就能掌握了-This is a written document PE virus Guide, which detailed the process and function, Hacker is a senior essential skills, from now on you will be able to grasp the
Platform: | Size: 3480 | Author: 于军亮 | Hits:

[Other resourcevirus

Description: 《计算机病毒分析与对抗》pe病毒源码
Platform: | Size: 4636 | Author: 00 | Hits:

[assembly languagevirus

Description: 一个用汇编写的小病毒,这个病毒虽然比较简单。但是麻雀虽小,五脏俱全。隐藏,感染,加密等模块应有尽有(只是不会破坏),是一个比较标准的DOS病毒,可以感染.EXE(不包括PE)和.COM的可执行文件。是进一步学习汇编的好
Platform: | Size: 2792 | Author: 傲天 | Hits:

[Hook apiPE文件格式

Description: PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted
Platform: | Size: 112507 | Author: 万惠华 | Hits:

[OtherTHE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE

Description: THE ART OF COMPUTER VIRUS RESEARCH AND DEFENSE 计算机病毒防范艺术 信息安全 PE 加密解密
Platform: | Size: 7026217 | Author: huaweiboy | Hits:

[Hook apipefile

Description: PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted.
Platform: | Size: 112640 | Author: 王峰 | Hits:

[Hook apiPE文件格式

Description: PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted
Platform: | Size: 112640 | Author: | Hits:

[OtherGAYBIN

Description: 关于感染型病毒行为基本原理的源代码。 1、熟悉PE结构,掌握感染过程。 -virus infection on the behavior of the basic tenets of the source code. A familiar with the structure of PE, master infection process.
Platform: | Size: 5120 | Author: 谢斌 | Hits:

[Othervirtus

Description: 一个小病毒 代码。没什么危害,入门级人的。。高手就不用看了。。可以感染DOS下的COM EXE文件。。不能感染PE文件-a small virus code. No harm, the entry-level person. . Master would not have to read. . DOS can be infected with the EXE COM documents. . PE documents can be infected
Platform: | Size: 2048 | Author: monst | Hits:

[OS programsetfile

Description: 此代码在程序运行的时候动态更改自己在任务管理器中显示的文件名. 代码中实现了将自身文件数据通过内存映射将自己保存在内存当中,.. 方便直接在内存执行程序,而不需要在硬盘保存有实际的文件名,实现 最近比较流行的无硬盘文件的病毒功能(目前在内存当中执行PE文件的 功能暂未实现,有兴趣的朋友可以参考<<加密解密技术>>一书), 本程序还实现了挂接系统关机 注销 重启..等事件,当发生以上事件,程序会 自动还原原本的程序名字...具体细节不多说了,大家还是看代码吧 -This code is running in the process of dynamic change in the Task Manager to display the file name. Realize the code itself through memory-mapped file data stored in its memory, the .. convenient and direct the implementation of procedures in memory without the need preserved in the hard disk has the actual file name, realize more popular in recent documents of virus-free hard drive function (which is currently in memory implementation of PE files yet realize, interested can refer to Friend
Platform: | Size: 2048 | Author: 田浩 | Hits:

[OS programpemaker0

Description: 编译环境VC+6.0,压缩包中包含1)用来修改头部的EXE文件2)测试程序。有助于让我们了解病毒是如何感染PE文件-Compiler environment VC+ 6.0, compressed package that contains one) is used to modify the head of the EXE file 2) test procedures. Help us to understand how the virus is infected PE files
Platform: | Size: 96256 | Author: 王冠 | Hits:

[File Formatdengkang_coff

Description: 我在网上下的,喜欢pe病毒的人可以先看看这个,学习文件格式很好的,-I am under the Internet, like pe virus can first take a look at this, learning a good file format,
Platform: | Size: 15360 | Author: 王文进 | Hits:

[source in ebookvirus

Description: 《计算机病毒分析与对抗》pe病毒源码 - Computer virus analysis and confrontation pe virus source
Platform: | Size: 4096 | Author: 00 | Hits:

[Hook apiHookDll

Description: PE文件是windows(95/98/NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。 -PE file is windows (95/98/NT) is currently used in the executable file format. CIH virus is prevalent PE by changing the contents of the file, and keep the file size unchanged, and thus realize their functions. This procedure by analyzing the PE file format, the executable file to re-positioning table positioning, pointing users to the preparation of the DLL, and then return to normal call instruction pointer location. Adopted in the DLL system linking all levels realize the background of the intercepted password function.
Platform: | Size: 64512 | Author: sujun | Hits:

[assembly languagevirus

Description: 一个用汇编写的小病毒,这个病毒虽然比较简单。但是麻雀虽小,五脏俱全。隐藏,感染,加密等模块应有尽有(只是不会破坏),是一个比较标准的DOS病毒,可以感染.EXE(不包括PE)和.COM的可执行文件。是进一步学习汇编的好-Used to write a compilation of small viruses, the virus is relatively simple though. However, small but complete. Hide, infection, encryption module everything (not only the destruction), is a relatively standard DOS viruses, can be infected. EXE (not including PE) and. COM executable file. Is to further study and compilation of good
Platform: | Size: 2048 | Author: 傲天 | Hits:

[Windows Developpemaker

Description: 使用c++,向PE中注入代码 使病毒编写如此简单-Use c++, To the PE to inject code to enable the preparation of such a simple virus
Platform: | Size: 68608 | Author: 王力 | Hits:

[Internet-Networkpe

Description: pe文件病毒的研究及实现,论文加源码,适合新手学习PE病毒.-pe files Research and Implementation of the virus, the paper added source for beginners to learn PE virus.
Platform: | Size: 288768 | Author: long | Hits:

[Windows Developpe

Description: PE病毒的感染部分,代码都是自己写的,不是网上的那些垃圾代码-PE virus infection part of the code is their own writing, not online that rubbish Code
Platform: | Size: 71680 | Author: 裴小伟 | Hits:

[OtherVirusthesis

Description: 硕士论文,对Windows PE病毒的感染、传播、加密、自我隐藏和保护等技术进行了详细的分析。并介绍了几种常见的反病毒技术。-Master' s thesis, on the Windows PE virus infection, transmission, encryption, self-hiding and protection technology for a detailed analysis. And introduces several common anti-virus technology.
Platform: | Size: 7304192 | Author: Twm | Hits:

[OtherPE-virus

Description: 模拟PE病毒,实现功能,但PE文件运行跳转到病毒运行之后有点问题,所以插入代码成功,但自动感染功能未实现。-I get it from other place,it s great.
Platform: | Size: 11264 | Author: lucy | Hits:
« 12 3 4 »

CodeBus www.codebus.net