Welcome![Sign In][Sign Up]
Location:
Search - trojan

Search list

[OS program一个VB写的国外木马的源代码the_dark_age

Description: 一个VB写的国外木马的源代码the_dark_age.zip-write a VB foreign Trojan source code the_dark_age.zip
Platform: | Size: 113664 | Author: waterwhu | Hits:

[Windows Develop2004032722451329676

Description: vc++著名的木马程序BO2000源代码-vc famous Trojan source code BO2
Platform: | Size: 601088 | Author: 震宇 | Hits:

[Remote Control木马YAI的源代码

Description: 木马YAI的源代码-Trojan source code
Platform: | Size: 322560 | Author: 姜涛 | Hits:

[Remote Controlmuma123

Description: 简单的木马源程序。-simple Trojan source.
Platform: | Size: 6144 | Author: sz | Hits:

[Remote ControlsysBug

Description: 一个自己编写的木马程序,包括服务端和客户端.服务端把自己注册成为服务,并且使用了类似MFC的查表命令解释机制.-prepared by a Trojan own procedures, including server and the client. Server themselves registered as a service, and the use of a similar order MFC Lookup explain the mechanism.
Platform: | Size: 932864 | Author: 梁我我 | Hits:

[Windows Developmmjb

Description: 著名的木马密码结巴的源代码。可是盗号码的经典了。是密码就能盗的。-famous Trojan Password articulation of the source code. However, the number of bootlegging a classic. Is the password can be stolen.
Platform: | Size: 714752 | Author: hong | Hits:

[Other反弹型木马原理

Description: 反弹型木马原理分析,对于一个想成为Hacker的人来说,------好书!-rebound Trojan Principle, to become a Hacker who ,------ books!
Platform: | Size: 39936 | Author: 王耀 | Hits:

[Remote ControlUO远程木马源码

Description: 一个经典的木马源程序,感兴趣的朋友可以下来看看。-It is a classical source code of a remote trojan, you can download it and have a try if you have interest in trojan.
Platform: | Size: 59392 | Author: 特务 | Hits:

[Other10期《CSDN开发高手》源代码

Description: 浅析木马服务端的生成技术,视频局部区域, 扩展表格控件-services of Trojan-generation technology, video local area, the expansion of form controls, etc.
Platform: | Size: 993280 | Author: tom | Hits:

[CSharp教你如何编写木马

Description: 全面教你编写木马,使你也成为木马高手让,能编出高质量的木马程序,也可以让你更加了解木马病毒,防范木马病毒-fully prepared Trojan teach you, so you become so expert Trojans can produce a quality Trojan program, but also allows you to better understand Trojan guard against Trojan
Platform: | Size: 37888 | Author: 冷风 | Hits:

[Remote Control051017NameLess114

Description: 木马代码 NameLess BackDoor V1.14(稳定版)源代码 , 十分珍贵的东西,强烈建议下载. 感谢作者的开源-Trojan code NameLess BackDoor V1.14 (stable version) source code, a very precious things, it is strongly recommended to download. Thanks to the open-source authors
Platform: | Size: 112640 | Author: 吴承英 | Hits:

[Other Databases1025_DLL

Description: VC++动态链接库编程之DLL木马源代码-VC dynamic link library DLL programming Trojan source code
Platform: | Size: 9216 | Author: 张磊 | Hits:

[OpenGL programbluepony

Description: 木馬自動旋轉,以及一些VB+opengl得用法-Trojan automatic rotation, and some in opengl VB usage, etc.
Platform: | Size: 7168 | Author: 林晉偉 | Hits:

[Windows DevelopDelphi版木马彩衣

Description: 木马彩衣,delphi版本的,可以用来伪装木马-Trojan coat, delphi version can be used to camouflage Trojan
Platform: | Size: 211968 | Author: 金属 | Hits:

[Windows Developwolf911

Description: 很经典的后门木马,功能就不用多说了吧,WOLF9-classic backdoor Trojan, functions on the fact the bar, WOLF9
Platform: | Size: 380928 | Author: 金属 | Hits:

[Remote ControltinyChat

Description: 支持多线程的木马程序,支持聊天,一个文件客户端和服务器端,有键盘监控,支持文件传输-multithreading support the Trojan program, support chat, a file server and the client side, the keyboard control, support for file transfer
Platform: | Size: 3049472 | Author: bill | Hits:

[CSharpMyTrojan

Description: 一套模拟特洛伊木马的程序,分为客户端和服务器端。-a Trojan simulation procedure is divided into client and server.
Platform: | Size: 23552 | Author: 任福新 | Hits:

[Internet-Networkmaprg

Description: 一个用VB开发的木马程序,服务器端与客户端!-a VB development of the Trojan program, the server-client!
Platform: | Size: 39936 | Author: wzx | Hits:

[Firewall-Securitykillengine.ZIP

Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB/CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy-- defense network scanning the realization Computer Virus Scan Extraction
Platform: | Size: 505856 | Author: hulipeng | Hits:

[Hook apiDetection_of_the_hidden_processes

Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: | Size: 15360 | Author: inwing | Hits:
« 1 23 4 5 6 7 8 9 10 ... 50 »

CodeBus www.codebus.net