Welcome![Sign In][Sign Up]
Location:
Search - trojan visual basic

Search list

[Remote Controlstorm

Description: 一个木马程序-A Trojan program
Platform: | Size: 150528 | Author: 站长 | Hits:

[Otherstormhobbyhorse

Description: 风暴木马非常好的木马程序-Storm Trojan horse program is very good
Platform: | Size: 131072 | Author: 站长 | Hits:

[Othercompletehobbyhorse

Description: 很完整的一个木马程序,也可以聊天...功能很全-Complete a Trojan program, you can chat function is very wide ...
Platform: | Size: 26624 | Author: 站长 | Hits:

[Internet-NetworkServe_Me

Description: 完整的特洛伊木马 Serve_Me 源代码-Trojan horse Serve_Me complete source code
Platform: | Size: 70656 | Author: 站长 | Hits:

[Othernetbus

Description: 大名鼎鼎的Netbus木马源程序.-the famous Trojan horse program.
Platform: | Size: 100352 | Author: 笨鸟 | Hits:

[Remote ControlCodeTrojan.R.A.I.D

Description: Trojan.R.A.I.D木马-Trojan.R.A.I.D Trojan
Platform: | Size: 208896 | Author: qlongonline | Hits:

[OpenGL programbluepony

Description: 木馬自動旋轉,以及一些VB+opengl得用法-Trojan automatic rotation, and some in opengl VB usage, etc.
Platform: | Size: 7168 | Author: 林晉偉 | Hits:

[Firewall-SecurityTroyDeffend

Description: 一个特洛伊木马防御系统,程序的解释相当详细,使用VB开发-a Trojan defense systems, procedures explained in considerable detail, using VB
Platform: | Size: 45056 | Author: mingxin | Hits:

[Windows Developmuma-vb

Description: 木马,也称特伊洛木马,名称源于古希腊的特伊洛马神话,是一种远程控制软件。现在网络上流行的木马软件基本都是客户机/服务器模式也就是所谓的C/S结构,目前也有一些开始向B/S结构转变,在这里暂且不对B/S结构进行详谈,本文主要介绍C/S结构其原理就是在本机直接启动运行的程序拥有与使用者相同的权限。因此如果能够启动服务器端(即被攻击的计算机)的服务器程序,就可以使用相应的客户端工具客户程序直接控制它了。下面来谈谈如何用VB来实现它。 -Trojan, also known as Trojan Teyiluo name from the ancient Greek myth of campaigning Lockheed Martin is a remote control software. Network now popular on the Trojan software is the basic client/server model is the so-called C/S structure, There are also some began to B/S structure, in the time being wrong B/S structure in detail This paper introduces the C/S structure of its tenets is directly in the machine up and running with the procedures for users with the same authority. So if we can start the server side (ie attacks on the computer) server, we can use the corresponding client tools clients direct control of it. Now to talk about how to use VB to achieve it.
Platform: | Size: 2048 | Author: longyi | Hits:

[Internet-NetworkSub7_R.A.I.D

Description: 这是一个类似Sub7的特洛伊木马R.A.I.D的源代码 -This is a similar Sub7 Trojan Horse of the source code R.A.I.D
Platform: | Size: 243712 | Author: | Hits:

[Hook apivb_keyhook

Description: VB纯代码实现全局钩子.做木马用的-pure VB code to achieve the overall hook. Trojan do with the
Platform: | Size: 14336 | Author: laaa | Hits:

[Remote Controlvbyuanchengkongzhi

Description: VB写的极好的远程控制程序,功能之强可以和国产木马冰河相比-VB wrote the excellent remote control procedures, functions and strong domestic Trojan can be compared to the last ice age
Platform: | Size: 168960 | Author: 拉拉 | Hits:

[Othermuma.doc

Description: VB编写出的简单的木马程序的一整套原代码-VB prepare the simple set of Trojan program source code
Platform: | Size: 6144 | Author: lazy | Hits:

[Othergfw

Description: 葡萄木马防火墙-Grape Trojan firewall
Platform: | Size: 423936 | Author: anjintong | Hits:

[Remote Controlfengbaomuma

Description: 这是我搜集一款非常优秀的远程控制木马源码-This is my very best to collect a remote control Trojan source
Platform: | Size: 130048 | Author: 董浩 | Hits:

[Othermumashenchengjishou

Description: 我知道很多人和我一样初学很辛苦所以我收集了这个木马生成技术的样本源码供大家学习-I know that many people and I like learning so I tried very, very hard to collect the samples of Trojan Generation source for everyone to learn
Platform: | Size: 110592 | Author: 董浩 | Hits:

[Graph Drawingmumayanshi

Description: vb开发的一个木马演示程序 了解木马的原理-vb developed a Trojan horse demo program to understand the principles of
Platform: | Size: 59392 | Author: hh | Hits:

[Windows DevelopVBHEIKEbiancheng

Description: 一个有关 外挂,木马,病毒,系统,通信,文件编程的电子文档,里面有编程实例-A plug-in, Trojan horses, viruses, systems, communications, document-programmed electronic documents, there are programming examples
Platform: | Size: 896000 | Author: aaa | Hits:

[Internet-NetworkPortScanner

Description: VB快速端口扫描器的源代码,能快速扫描计算机或局域网中所有存在安全隐患的端口。程序中附带特洛伊和后门程序信息的数据库,主要特色是扫描速度快,扫描32,000个端口仅仅需要一分钟不到。你可以更新数据库中的特洛伊和后门程序信息以便进行比对和查找可疑打开的端口。程序代码还有一些比较好的IP转换为域名以及互相转换的函数,对VB网络编程的朋友有一定参考价值。-Fast port scanner VB source code, can quickly scan your computer or local area network security risks exist in all the ports. Proceedings incidental to backdoor Trojan and information database, the main features of the scanning speed, scan 32,000 ports only need less than a minute. You can update the database of Troy and the back door in order to process the information to compare and find suspicious open ports. Some code is converted to a better domain name and IP conversion function with each other on network programming VB friends have a certain reference value.
Platform: | Size: 147456 | Author: Rhode | Hits:

[Remote ControlCoailii Stealer

Description: coal i steal tool trojan
Platform: | Size: 861184 | Author: code8 | Hits:
« 12 »

CodeBus www.codebus.net