Welcome![Sign In][Sign Up]
Location:
Search - rootkits

Search list

[Exploitklister-0.4

Description: read the internal kernel data structures, in order to get reliable information about the system state (like list of all processes, including those \"hidden\" by rootkits, even by fu )
Platform: | Size: 114604 | Author: ketty | Hits:

[Windows DevelopWindows-Anti-Rootkits

Description: 基于Windows内核层的Anti-Rootkits研究及其实现-Based on the Windows kernel level Anti-Rootkits Research and Implementation
Platform: | Size: 990208 | Author: shuai | Hits:

[OS programFU_Lite

Description: Shadow Walker is not a weaponized attack tool. Its functionality is limited and it makes no effort to hide it s hook on the IDT or its page fault handler code. It provides only a practical proof of concept implementation of virtual memory subversion. By inverting the defensive software implementation of non executalbe memory, we show that it is possible to subvert the view of virtual memory relied upon by the operating system and almost all security scanner applications. Due to its exploitation of the TLB architecture, Shadow Walker is transparent and exhibits an extremely light weight performance hit. Such characteristics will no doubt make it an attractive solution for viruses, worms, and spyware applications in addition to rootkits. -Shadow Walker is not a weaponized attack tool. Its functionality is limited and it makes no effort to hide it s hook on the IDT or its page fault handler code. It provides only a practical proof of concept implementation of virtual memory subversion. By inverting the defensive software implementation of non executalbe memory, we show that it is possible to subvert the view of virtual memory relied upon by the operating system and almost all security scanner applications. Due to its exploitation of the TLB architecture, Shadow Walker is transparent and exhibits an extremely light weight performance hit. Such characteristics will no doubt make it an attractive solution for viruses, worms, and spyware applications in addition to rootkits.
Platform: | Size: 24576 | Author: kkakekikoku | Hits:

[VC/MFCROOTKITS--Windows

Description: 好书,值得一看,是学习ROOTKIT 的好书-Good book ,it is worlth of you to read
Platform: | Size: 1156096 | Author: 邱和林 | Hits:

[OtherInsideWindowsRootkits

Description: Inside windows rootkits,对学习rootkits有好处,可以作为深入学习rootkits的参考-Inside windows rootkits, good for learning rootkits, rootkits can be used as reference for in-depth study
Platform: | Size: 691200 | Author: 王谦 | Hits:

[Hook apiNewWayToFindRookits

Description: rootkits检测新方法,可以作为对rootkits的研究资料-new method for detecting rootkits can be used as research data on rootkits
Platform: | Size: 936960 | Author: 王谦 | Hits:

[Hook apiKernelRootkitsImplementandDetection

Description: 基于内核的ROOTKITS的实现以及检测,学习安全的程序员可以参考-Kernel-based ROOTKITS the realization and detection, to study the safety of programmers can refer to the
Platform: | Size: 1414144 | Author: 王谦 | Hits:

[OtherRootkits_Subverting_the_Windows_Kernel

Description: Rootkits Subverting the Windows Kernel
Platform: | Size: 1666048 | Author: munizf | Hits:

[Hook apihookmap-raid08

Description: Countering Persistent Kernel Rootkits Through Systematic Hook Discovery
Platform: | Size: 168960 | Author: Oleg | Hits:

[Hook apiccs09-HookSafe

Description: Countering Kernel Rootkits with Lightweight Hook Protection
Platform: | Size: 175104 | Author: Oleg | Hits:

[Windows DevelopROOTKITS_src

Description: <ROOTKITS——Windows内核的安全防护>一书的配套代码。 非常值得rootkit爱好者们学习。-<ROOTKITS——Windows内核的安全防护> A complete code for the book. Rootkit lovers very worthwhile to learn.
Platform: | Size: 514048 | Author: zombie | Hits:

[VC/MFCProfessionalRootkitsBook

Description: Professional Rootkits 书籍,一本很不错的讲解Rootkit的电子书-Professional Rootkits books, a very good e-books explain the Rootkit. .
Platform: | Size: 8218624 | Author: 王强 | Hits:

[Windows DevelopRootkit

Description: 《Rootkits——Windows内核的安全防护》一书的中文扫描版,是学习Rootkits的精典教材。-" Rootkits- Windows kernel security," a book of Chinese scan version of the classic textbook for learning Rootkits.
Platform: | Size: 21720064 | Author: 许静 | Hits:

[OS programhiding_concepts_rootkits

Description: Many people do not realize the real danger from rootkit technology. One reason for this probably that publicly available rootkits for Windows OS are relatively easy to detect by conventional methods (i.e. memory scanning based). However, we can imagine some techniques of rootkit implementation, which will be undetectable by these methods, even if the rootkit concept will be publicly available… In order to convince people that traditional rootkit detection is insufficient it would be desirable to have a working rootkit implementing such sophisticated technology.-Many people do not realize the real danger from rootkit technology. One reason for this is probably that publicly available rootkits for Windows OS are relatively easy to detect by conventional methods (i.e. memory scanning based). However, we can imagine some techniques of rootkit implementation, which will be undetectable by these methods, even if the rootkit concept will be publicly available… In order to convince people that traditional rootkit detection is insufficient it would be desirable to have a working rootkit implementing such sophisticated technology.
Platform: | Size: 222208 | Author: alice | Hits:

[Windows DevelopProfessional-Rootkits

Description: 《Professional Rootkits》的课本上的源代码和常用的调试工具-" Professional Rootkits" a textbook commonly used in the source code and debugging tools
Platform: | Size: 18578432 | Author: jackywu | Hits:

[Hook apiWindows-Rootkits

Description: Rootkits技术在信息安全领域越来越受到重视,各种Anti-rootkits新技术不断出现。在各种Anti-root- kits工具的围剿下,常规的Rootkits隐藏技术难以遁形。在系统分析和深入研究传统内核级Rootkits隐藏技术的基 础上,提出了一个集驱动模块整体移位、内核线程注入、IRP深度内联Hook 3种技术为一体的Rootkits隐藏技术体 系。-Rootkits technology in the field of information security more and more attention, all kinds of Anti-rootkits new technologies continue to emerge. In a variety of Anti-root-kits Tools of the siege, the conventional Rootkits hide the technology is difficult to hide. In traditional systems analysis and in-depth study of kernel-level Rootkits hiding technique is proposed based on a set of drive module as a whole shift, into the kernel thread, IRP depth inline Hook 3 kinds of technology as one of the Rootkits hide the technical system.
Platform: | Size: 417792 | Author: 赵鑫维 | Hits:

[Windows Developprofessional.rootkits

Description: 你想深入学习程序设计吗,如果想学,可以看看这本书,并且里面包含源代码-Rootkits do you want to learn, if you want to learn, you can look at this book, and which contains the source code
Platform: | Size: 5400576 | Author: 704928782 | Hits:

[Software EngineeringHunting-rootkits-with-Windbg

Description: Hunting rootkits with Windbg
Platform: | Size: 431104 | Author: omkar | Hits:

[OtherDesigning.BSD.Rootkits.Apr.2007

Description: 关于freeBSD的Rootkit的安全书籍,值得关注安全方面的研发者研究。-Designing BSD Rootkits Apr 2007 pdf
Platform: | Size: 7797760 | Author: 搜索死 | Hits:

[BooksRootkits and Bootkits 2019 English edition

Description: rootkits and bootkits 2019 Enlish edition
Platform: | Size: 12457984 | Author: 光帅帅 | Hits:
« 1 23 4 5 »

CodeBus www.codebus.net