Welcome![Sign In][Sign Up]
Location:
Search - shadow walker

Search list

[Hook apiShadowWalker1.0

Description: 展示一个简单的实现,关于虚拟内存“钩子”和它的潜在应用的高级内核rootkits-Shadow Walker demonstrates a simple implementation of virtual memory "hooking" and it s potential application to advanced kernel rootkits.
Platform: | Size: 100352 | Author: 袁晓辉 | Hits:

[ADO-ODBCSW

Description: Shadow Walker as seen at Black Hat and Phrack 63. Shadow Walker as seen at Black Hat and Phrack 63. Shadow Walker as seen at Black Hat and Phrack 63.-Shadow Walker as seen at Black Hat and Phrack 63. Shadow Walker as seen at Black Hat and Phrack 63. Shadow Walker as seen at Black Hat and Phrack 63. Shadow Walker as seen at Black Hat and Phrack 63.
Platform: | Size: 198656 | Author: kkakekikoku | Hits:

[OS programFU_Lite

Description: Shadow Walker is not a weaponized attack tool. Its functionality is limited and it makes no effort to hide it s hook on the IDT or its page fault handler code. It provides only a practical proof of concept implementation of virtual memory subversion. By inverting the defensive software implementation of non executalbe memory, we show that it is possible to subvert the view of virtual memory relied upon by the operating system and almost all security scanner applications. Due to its exploitation of the TLB architecture, Shadow Walker is transparent and exhibits an extremely light weight performance hit. Such characteristics will no doubt make it an attractive solution for viruses, worms, and spyware applications in addition to rootkits. -Shadow Walker is not a weaponized attack tool. Its functionality is limited and it makes no effort to hide it s hook on the IDT or its page fault handler code. It provides only a practical proof of concept implementation of virtual memory subversion. By inverting the defensive software implementation of non executalbe memory, we show that it is possible to subvert the view of virtual memory relied upon by the operating system and almost all security scanner applications. Due to its exploitation of the TLB architecture, Shadow Walker is transparent and exhibits an extremely light weight performance hit. Such characteristics will no doubt make it an attractive solution for viruses, worms, and spyware applications in addition to rootkits.
Platform: | Size: 24576 | Author: kkakekikoku | Hits:

[Driver Developsw_remove

Description: shadow walker remove
Platform: | Size: 31744 | Author: owner | Hits:

[Button controlCMyMoveButton

Description: 基于对话框的,实现了 在对话框中动态拖动按钮,无闪屏,简单实用。 by --暗影行者-Dialog-based, to achieve a dynamic drag the button in the dialog box, no splash screen, simple and practical. by- Shadow Walker
Platform: | Size: 38912 | Author: 暗影行者 | Hits:

[Internet-NetworkSetKeyValue2.5

Description: 多个 IP 自由切换工具,简单实用 这是源代码 BY--暗影行者。-Multiple IP free to switch tools, source code is simple and practical BY- Shadow Walker.
Platform: | Size: 69632 | Author: 暗影行者 | Hits:

CodeBus www.codebus.net