Welcome![Sign In][Sign Up]
Location:
Search - trojan delphi

Search list

[Windows Developpmlx

Description: 一个记录屏幕录象木马的源程序,源程序 delphi 试试看吧-This is a source code that can track the Trojan Horse of Screen Record. It can be opened in Delphi.
Platform: | Size: 167044 | Author: 章克武 | Hits:

[Othermoshoumouma

Description: 一个魔兽木成生成器的源代码(DELPHI编写),包括木马程序和生成程序两部份,是一个值得学习的另类源码-Warcraft wood into a generation of source code (DELPHI prepared), including Trojan program and generate some two procedures is a worthy alternative source of learning
Platform: | Size: 1412761 | Author: 周逸梦 | Hits:

[Hook apiDelphimumaxiazaize)

Description: Delphi简单编写网络木马下载者工具及源码`学习木马下载的好东西-Delphi simple preparation network Trojan downloading tools and learning FOSS `Trojan downloaded a good thing
Platform: | Size: 204719 | Author: www | Hits:

[WinSock-NDIS582513014

Description: delphi编的木马程序 delphi编的木马程序 -delphi addendum to the Trojan program de lphi addendum to the Trojan program de lphi addendum to the Trojan program de lp hi addendum to the Trojan program delphi addendum to the Trojan program
Platform: | Size: 205790 | Author: lin | Hits:

[Communicationdelphimuma

Description: delphi写的木马程序,大家参考一下!希望对的大家有帮助!-delphi write Trojan program, we take a look! We hope to have the help!
Platform: | Size: 430855 | Author: 朱平 | Hits:

[ScannerMyHack

Description: 这是一款木马程序,分为主控端和被控端。delphi源码-A Trojan program, and is divided into Zhukongduan Beikongduan. Delphi FOSS
Platform: | Size: 280629 | Author: Michael Chan | Hits:

[OS programjcjs

Description: Delphi写的一个进程监视程序,能实时监视进程的活动,能自动结束木马病毒进程。-Delphi process of writing a surveillance procedures, real-time process monitoring activities, can automatically process the end of Trojan horse virus.
Platform: | Size: 185380 | Author: 小鱼 | Hits:

[Remote Control传奇2木马代码

Description: 写得非常精巧的传奇2木马代码.完全delphi源代码。-is very intricate two legendary Trojan code. Delphi full source code.
Platform: | Size: 59793 | Author: 张罗 | Hits:

[Remote Control200531516410838

Description: 反弹木马凹,可以看看凹,delphi写的,真不知道怎么样才能写够20个字啊,汗了,还是一个很有用的代码,可以参考-rebound Trojan Au, can look at Au, delphi write, I really do not know how kind enough to write 20 words ah, Khan, or a very useful code can reference
Platform: | Size: 1570253 | Author: 葛维 | Hits:

[Remote Control2003070617170131997

Description: 木马程序,使用delphi编写,涉及到基本的远程控制等等;-Trojan program, the use of delphi preparation, involving basic remote control, etc.;
Platform: | Size: 240012 | Author: 丁鹏 | Hits:

[Internet-NetworkDarkmoon

Description: 国外著名的远程控制软件(木马)Darkmoon的源代码,反弹端口,进程注入.要学习写木马的值得一看-famous remote control software (Trojans) Darkmoon source code rebound ports, the process of implantation. Learning to write is worth looking at the Trojans
Platform: | Size: 3842048 | Author: 东南 | Hits:

[Internet-Network582513014

Description: delphi编的木马程序 delphi编的木马程序 -delphi addendum to the Trojan program de lphi addendum to the Trojan program de lphi addendum to the Trojan program de lp hi addendum to the Trojan program delphi addendum to the Trojan program
Platform: | Size: 205824 | Author: lin | Hits:

[Game Hook CrackCQ2

Description: 传奇2木马完整代码 delphi的,可以参考-2 Trojan legend delphi code integrity, and can refer to
Platform: | Size: 264192 | Author: 肌醇化 | Hits:

[Other9133195720050422newsmir

Description: 传奇木马....delphi版 学习资料-Version of the legendary Trojan Horse .... delphi learning materials
Platform: | Size: 229376 | Author: pcie7777 | Hits:

[Delphi VCLDelphi.programming.code.Trojan.immune.Module

Description: Delphi编程木马免疫模块设计代码Delphi programming code Trojan immune Module -Delphi programming code Trojan immune Module
Platform: | Size: 294912 | Author: er | Hits:

[Internet-NetworkSources

Description: 一个利用Windows Socket的例子,实现了一个简单的后门木马功能:运行iServer后,将监听9626端口,并且将自己复制到System32目录以后自启动;通过iClient即可连接被控端执行Cmd命令,以达到简单的控制目的;-An example of using Windows Socket to achieve a simple backdoor Trojan functionality: running iServer, will be listening port 9626 and will be copied to the System32 directory after his self-starting hosts can be connected through iClient Cmd command execute in order to achieve simple control purposes
Platform: | Size: 7168 | Author: robin | Hits:

[OS programdllzhuru

Description: 远程注入DLL方法有很多种,也是很多木马病毒所使用的隐藏进程的方法,因为通过程序加载的DLL在进程管理器是没有显示的.-Remote DLL Injection There are many ways, is also used by many Trojan hidden process, because the DLL loaded by the program manager in the process is not shown.
Platform: | Size: 95232 | Author: lsenfk | Hits:

[Process-ThreadDelphi-unloading-DLL-process

Description: 正一些木马采用DLL注入的方式存在于系统中,由于其隐蔽性,对于用户来说是很大威胁,下面介绍如何用Delphi卸载任意进程的某个动态链接库DLL。一、DLL注入DLL注人是指以各种如钩子、远程线程、木马DLL等方式,将某个DLL注入到目标进程中运行,由于不需要进程驻留,这种方式往往能达到较好的隐藏效果。-Some Trojans are using DLL injection methods exist in the system, because of its hidden nature, is a big threat for users, here' s how to use Delphi to uninstall any process of a dynamic link library DLL. A, DLL injection DLL injection refers to a variety of such hooks, remote thread, Trojan DLL, etc., will inject a DLL into the target process is running, because no process resides, in this way can often achieve better Hidden effect.
Platform: | Size: 269312 | Author: 黄进 | Hits:

[Other3xBackdoor PL+FAQ Pisanie trojana

Description: delphi trojan source code
Platform: | Size: 817152 | Author: silverboy | Hits:

[Otherdelphi_二维码QRCODE_生成类及使用示例

Description: delphi Xe实现二维码图开发详细示例程序含源码 无病毒无木马(Delphi Xe implementation of two-dimensional code diagram development detailed sample program containing source free virus free Trojan horse)
Platform: | Size: 257024 | Author: Why Im OK | Hits:
« 1 2 3 4 56 »

CodeBus www.codebus.net