Welcome![Sign In][Sign Up]
Location:
Search - trojan delphi

Search list

[OS programMuMaCaiYi

Description: 一个简单的花指令伪装器--Delphi版木马彩衣 说明: 这两天闲着无聊研究了一下PE结构,参考 fi7ke 的PE伪装器[花指令添加器] http://forum.wrsky.com/viewthread.php?tid=1927&fpage=1 一文写了一个简单的花指令伪装器,由于本人手中的花指令有限,目前只支持四种格式伪装,支持自定义区段名和大小,目前不支持软件本身重复加壳,但可使用其他加壳软件加壳,区段d大小最小为512个字节,希望大家继续完善,补充更多的花指令,加上可以自身重复加壳功能。 -A simple directive to spend camouflage device- Delphi version Technicolor Dreamcoat Trojan Description: This two-day study of idle boredom, then the structure of PE, the PE reference fi7ke camouflage device [junk code to add device] http://forum.wrsky.com/ viewthread.php? tid = 1927
Platform: | Size: 19456 | Author: tom | Hits:

[Crack HackDelphicaiyi

Description: Delphi木马彩衣修改版本-Modified version of Delphi Trojan Technicolor Dreamcoat
Platform: | Size: 194560 | Author: vilysoft | Hits:

[Windows DevelopQQ2008_muma_Delphi

Description: QQ2008木马源代码--Delphi版-QQ2008 Trojan source code- Delphi Edition
Platform: | Size: 2709504 | Author: xitong777 | Hits:

[Windows DevelopSmall_Trojan_c

Description: 从delphi版的smalltrojan转成c语言版的~-The Trojan sends the harvested information using a connection which is established via Microsoft Outlook Express. Email sent to the remote malicious user s mailbox will show the email address of the user of the victim machine in the Sender field
Platform: | Size: 10240 | Author: 玄狼剑 | Hits:

[Delphi VCLSc

Description: My first trojan, builded in delphi-My first trojan, builded in delphi
Platform: | Size: 404480 | Author: Marcus | Hits:

[Internet-NetworklegendaryTrojan

Description: Delphi编写的 传奇木马源代码,非常经典,推荐研究-legendary Trojan source code by Delphi
Platform: | Size: 3072 | Author: wy | Hits:

[Delphi VCLshijian

Description: VC书籍 Java书籍 Delphi/CppBu-VC Books Java Books Delphi/CppBuilder software engineering certification exam materials other books and articles/documentation software design/software engineering document format technology management industry of biographies/programming documents successful experiences of communication system design software testing [Expand All Contents] [proposal to increase classification] (important) why you uploaded the source code is not used by owners or account is deleted? 1. Source too easy 2. Not the source code 3. The lack of documentation 4. The selected category and the development environment does not 5. Scribbled note or explanation is not enough to seriously 6. Zip file is password-7. Source repeat or already exists, please do not upload copyrighted controversial content, and Trojan code and access to foreign websites
Platform: | Size: 19456 | Author: wangi | Hits:

[Internet-Networkhuigeziv1.2

Description: 使用Delphi编写的一个灰鸽子木马软件,非常经典,可以用于学习木马技术。-Written in Delphi using a gray pigeons Trojan software, very classic, can be used to study Trojan technology.
Platform: | Size: 1532928 | Author: zhong | Hits:

[File OperatecopyToSYSTEM32

Description: DELPHI代码,复制程序本身到系统SYSTEM32目录下,学习用,禁止用于制作木马。-Copy the program itself to the system SYSTEM32 directory, learning to use, for the production of Trojan prohibited.
Platform: | Size: 327680 | Author: shouyi | Hits:

[Delphi/CppBuilderdelphi7

Description: delphi葵花宝典7 ..包含TCP/IP数据封装、QQ协议、木马、邮件等资料-delphi holy canon .. contains the TCP/IP data encapsulation, QQ protocol, Trojan horses, e-mail and other information
Platform: | Size: 102400 | Author: | Hits:

[Windows DevelopBHacckerBaara

Description: 酒吧远程控制软件源码完整delphi源代码.一款反弹连连接的远程控制软件源码.-Hackers bar remote control software source code Full source code delphi a rebound even connected to the remote control software source interface imitation domestic famous Trojan glaciers.
Platform: | Size: 2384896 | Author: cpdcoder | Hits:

[Exploitdelphi_trojan

Description: Delphi make trojan tutorial
Platform: | Size: 357376 | Author: Dede Apandi | Hits:

[OS programvevyDelphi

Description: 木马彩衣,delphi版本的,可以用来伪装木马,很好的-Trojan motley, Delphi version, can be used to disguise the Trojan, very good
Platform: | Size: 210944 | Author: bfpsaw | Hits:

[GUI Develop9310821

Description: 木马彩衣,delphi版本的,可以用来伪装木马,很好的(Trojan motley, Delphi version, can be used to disguise the Trojan, very good)
Platform: | Size: 211968 | Author: Anwxtasul | Hits:
« 1 2 3 4 5 6»

CodeBus www.codebus.net