Welcome![Sign In][Sign Up]
Location:
Search - trojans

Search list

[OS programjincheng

Description: vb版的枚举隐藏进程,隐藏木马、病毒无处藏身-vb version of the enumeration hidden processes, hidden Trojans, viruses have no place to hide
Platform: | Size: 9216 | Author: lmgz | Hits:

[VC/MFCTrojanhorse

Description: 严重声明:这个木马只是供C语言新手参考,开玩笑没关系,但如果用来做不法的事情,本人概不负责。还有,编病毒、木马去做违法的事情惩罚是很重的,你如果想学编程,编个简单的就好了,否则后果很严重。 -Serious statement: This Trojan horse is for novice C language reference, a joke does not matter, but if used to do illegal things, I will not be responsible. In addition, for viruses, Trojans do illegal things are very heavy penalties, if you do want to learn programming just for a simple, or else very serious consequences.
Platform: | Size: 1024 | Author: 王栋 | Hits:

[Internet-Networkmuma

Description: 这是一个用DELPHI编写的木马程序,当然,主要是用于说明使用SOCKET编程的方法,用于木马程序,只是其中的一种用法.-This is a prepared using DELPHI Trojans, of course, is mainly used to describe the methods used SOCKET programming for the Trojans, but one of usage.
Platform: | Size: 20480 | Author: 冯小刚 | Hits:

[Internet-NetworkIce_Trojan_experimental_invasion_and_protection.ra

Description: 冰河木马入侵和防护实验。通过使用 IPC$ 漏洞扫描器发现网络中有安全漏洞的主机,植入木马程序,控制远程主机,然后在客户端查杀木马,进行防护。-Ice Trojan experimental invasion and protection. Through the use of IPC $ network vulnerability scanner found security vulnerabilities in the host Trojans implants to control the remote host, and then killing the Trojan on the client to carry out protection.
Platform: | Size: 8155136 | Author: qianchen | Hits:

[Internet-NetworkAntitrojan

Description: 杀木马程序源代码-Trojans kill the source code
Platform: | Size: 3397632 | Author: sp | Hits:

[source in ebookroseVB

Description: 一个较为完整的VB木马程序。只是文件上传功能还不太完善。-A more complete VB Trojans. File upload feature is not perfect.
Platform: | Size: 227328 | Author: 焦亭 | Hits:

[VC/MFCinside_windows_rootkits

Description: 见包名字就知道是什么了哦,对ENG好的人来说就是好东西-Although they have been around for quite some time, rootkits have become somewhat of a buzzword in the security industry over the past year. While rootkits have traditionally been used by sophisticated attackers to hide their presence on compromised machines, recent worms, viruses, and trojans have started using them to complicate efforts to detect and clean infected machines. Microsoft recently reported that over twenty percent of the malware found by their malicious code removal tool on Windows XP Service Pack 2 machines contained rootkit technology [1]. By hiding the infection, rootkits allow the malicious software to remain on the system for a longer period of time. This enables the malicious software to steal more information, send out more spam, launch more DDOS attacks, and ultimately make more money for whoever is controlling it. Even some commercial software has adopted techniques used by rootkits for protection. The most famous example of this is the Sony Digital Ri
Platform: | Size: 691200 | Author: fdef | Hits:

[Internet-Network78876

Description: 一个经典的反弹木马源码,采用server,client的方式-Trojans rebound of a classic source, the server, client approach
Platform: | Size: 23552 | Author: 浊风 | Hits:

[Remote Controlmuma

Description: 4个经典反弹端口木马程序源码 适合有志者学习-4 Trojans rebound classic source for learning
Platform: | Size: 8192 | Author: zlintact | Hits:

[Internet-Networkremotecontrol

Description: 一个远程控制编程技术源程序及代码,其中包括键盘记录,木马隐藏,ip技术,后门等等基础源码,可算作灰鸽子的前身-A remote control and programming source code, including keyloggers, trojans hide, ip technology, the back door and so on the basis of source, can be regarded as the predecessor of gray pigeons
Platform: | Size: 573440 | Author: tangd | Hits:

[OS programoicq_mm

Description: OICQ木马程序,将本程序的快捷方式取代OICQ的快捷方式,运行本程序后第一次后产生配置文件password.ini与密码文件password.txt.修改password.ini中的oicq=真正的OICQ路径,number为记录是否运行过本程序,如运行过,则直接运行真正的OICQ,并修改number=0,以使下次直接运行本程序。-OICQ Trojans will be a shortcut to this procedure to replace OICQ shortcut, run the program after the first password.ini configuration file and password file password.txt. Modify password.ini in oicq = true OICQ path, number run-off for the records of the proceedings, such as running, then run the real direct OICQ, and modifying the number = 0, so that the next run of the program directly.
Platform: | Size: 134144 | Author: liyang | Hits:

[Othermuma_bingdu_jiaocheng

Description: 计算机病毒与木马程序设计剖析 教你了解木马及病毒的原理。-Computer viruses and Trojan program design analysis teach you to understand the principle of Trojans and viruses.
Platform: | Size: 18069504 | Author: 吗啡 | Hits:

[CSharpWEBanjianyuan

Description: WEB服务器安检员C#源程序,下载后用VS2008打开在开发,共享了! WEB服务器安检员是用C#开发的一个web网站服务器查杀asp\php\asp.net网页木马的程序,而且还可以清除挂马。功能还是不错,杀马查马速度很快。适合服务器商使用!开发不是很完美,但是可以使用,希望有朋友在开发!! -WEB server安检员C# source code, download VS2008 to open later in the development and sharing of the! WEB server安检员is a C# Development web site server killing asp \ php \ asp.net page Trojans procedures, but also can be linked to clear Ma. Function well, kill fast Machado MA. For the server to use! Development is not perfect, but you can use, would like to have friends in the development! !
Platform: | Size: 1389568 | Author: 张勤伟 | Hits:

[Windows Developremote_shutdown

Description: 远程关机的代码,类似XP的ShutDown,不用木马技术。-Remote shutdown of the code, similar to XP' s ShutDown, Trojans do not have technology.
Platform: | Size: 174080 | Author: xiaoniao | Hits:

[Internet-Networksuperscan4

Description: 功能强大的端口扫描工具。 1)通过Ping来检验IP是否在线;  2)IP和域名相互转换;  3)检验目标计算机提供的服务类别;  4)检验一定范围目标计算机的是否在线和端口情况;  5)工具自定义列表检验目标计算机是否在线和端口情况;  6)自定义要检验的端口,并可以保存为端口列表文件;  7)软件自带一个木马端口列表trojans.lst,通过这个列表我们可以检测目标计算机是否有木马;同时,我们也可以自己定义修改这个木马端口列表。-SuperScan 4 is a completely-rewritten update of the highly popular Windows port scanning tool, SuperScan.
Platform: | Size: 201728 | Author: james | Hits:

[OS programCh3389

Description: 修改远程桌面连接端口: 1)读取注册表REG_DWORD值. 2)更改注册表REG_DWORD值. 3)联系方式(QQ:34596561 | E-mail:airen3339@163.com) 近期工作需要,需要更改远程桌面连接端口,网上的软件也不少,但下载下来有的总提示有病毒,由于在服务器使用,也不敢轻易使用,这样免费的软件总要绑定木马呢?既然想免费供大家使用,就应该真正的安全的供大家使用.根据更改远程连接端口的原理,即修改注册表两项REG_DWORD值,然后重启计算机即可完成.-Modify the Remote Desktop Connection Port: 1) read the registry REG_DWORD value. 2) Change the registry REG_DWORD value. 3) Contact (QQ: 34596561 | E-mail: airen3339@163.com) Recent work needs, need to change the Remote Desktop Connection port, web-based software, but do not down some general tips to download a virus, since the server is also not easy to use, so that free software always bound Trojans do? Now free for everyone to use, it should be a real safe for all to use. According to the principle to change the remote port, that is to modify the registry two REG_DWORD value, and then restart the computer to complete. ================================================== ============================================== Access to the server port settings, the registry there are two areas need to modify. First: [HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Control \ Terminal Server \ Wds \ rdpwd \ Tds \ tcp \] PortNumber value, default is 3389,
Platform: | Size: 33792 | Author: 依星 | Hits:

[Linux-Unixdoc

Description: unix下面对病毒,木马编写的一些常用方法,本文有实际的实例程序,对于新手非常的适合-unix the following pairs of viruses, Trojans prepared by some of the commonly used methods, there are practical examples of this procedure is very suitable for the novice
Platform: | Size: 506880 | Author: 李杰 | Hits:

[Windows Developrenwulanshanshuo

Description: 实现任务栏闪烁功能,类似QQ,有消息自动提醒,无病毒、木马。-To achieve the task bar flashes functions, similar to the QQ, a news automated reminders, no viruses, Trojans.
Platform: | Size: 35840 | Author: 天下无贼 | Hits:

[Internet-NetworkDNS

Description: DNS全自动溢出源码版特点就是HTTP下载木马,提高了效率,源码版。有没后门不要我多说吧?嘿嘿 这个工具不要我多说~了解DNS漏洞的朋友都知道怎么用!-DNS automatic overflow feature source version of HTTP to download Trojans, improve efficiency, source version. There is no back door Well not me? Hei hei this tool do not want me to say ~ about DNS vulnerabilities friends all know how to use!
Platform: | Size: 3072 | Author: 绝对零度 | Hits:

[ActiveX/DCOM/ATLActiveXStart

Description: ActiveX 自启动方式有很多木马在使用,好象国内的比较少,最近突然多起来了 由于我一向在 网吧上网,内网肉鸡通常是上不了线的,所以需要端口映射,于是我在几台服务器肉鸡上装了 Vidc 这个东西,可惜 vidc 1.2 服务端是不会自己启动的,所以就需要动手改造。随便研究了一下,呵呵。安装为服务?注册表Run键? [attach=130] 可惜现在是个鸟,无论 老鸟还是菜鸟都喜欢去查看这几个地方,加是什么 优化大师 的帮助,很快,改造的木马over了,其实我们不妨使用下 ActiveX 详细信息看下面的代码 Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINESOFTWAREMicrosoftActive SetupInstalled Components{4A202188-F04D-11cf-64CD-31FFAFEECF20}] "StubPath"="sunray.exe" 其中的 {4A202188-F04D-11cf-64CD-31FFAFEECF20} 即为启动键值,可以随机替换为合理的值 把上面的代码保存为 run.reg 导入注册表,每次开机就会启动 系统目录下的 sunray.exe -There are many ways since the launch of ActiveX Trojan in use, if the domestic is relatively small, the recent sudden increased recently in As I have always been in the cafe Internet, Intranet chickens usually are not able to line, so the need for port mapping, so I have a few servers broiler upload a Vidc this thing, unfortunately vidc 1.2 server will not start their own, so we need to Hands-transformation. Casual study a little, He He. Installed as a service? Registry Run keys? [attach = 130] Unfortunately, now is a bird or a rookie like both fields and then go to see these places, plus What is the optimal master s help, quickly transform the Trojans over, but in fact we may use the following ActiveX For more information see the following code Windows Registry Editor Version 5.00 [HKEY_LOCAL_MACHINESOFTWAREMicrosoftActive SetupInstalled Components (4A202188-F04D-11cf-64CD-31FFAFEECF20)] "StubPath" = "sunray.exe" Where (4A202188-F04D-11cf-64CD-31FFAFEECF20) shal
Platform: | Size: 3072 | Author: Gougou | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 16 »

CodeBus www.codebus.net