Welcome![Sign In][Sign Up]
Location:
Search - trojans

Search list

[OS programBAV

Description: 杀毒软件开源引擎 对一般木马还是可以的-Anti-virus software, open source engine in general is still possible Trojans
Platform: | Size: 17408 | Author: 小鱼 | Hits:

[Othersimpleepo

Description: This the simple infector/shellcode generator. Infects EXE-files by encrypted with random key shellcode, which is available to execute specified command. It could be used in trojans or bots as an alternative for autorun. Does not change the file size.-This is the simple infector/shellcode generator. Infects EXE-files by encrypted with random key shellcode, which is available to execute specified command. It could be used in trojans or bots as an alternative for autorun. Does not change the file size.
Platform: | Size: 6144 | Author: sogetthis | Hits:

[Other104zqcmmff

Description: 104种清除木马方法.chm 很多新手对安全问题了解比较不多,计算机中了特洛伊木马不知道怎么样来清除。虽然现在有很多的清除特洛伊木马的软件,可以自动清除木马。但你不知道木马是怎样在计算机中运行的,如果你看了这篇文章之后,你就会明白一些木马的原理。-104 kinds of Trojan removal methods. Chm many novice relatively little understanding of security issues, the computer in a Trojan horse does not know how to remove. Although there are many removal Trojan horse software that can automatically remove Trojan. But you do not know how the Trojan is running in the computer, if you read this article, you will understand the principle of some Trojans.
Platform: | Size: 37888 | Author: 蓝冰 | Hits:

[OtherAll_info

Description: Programmed in Visual Basic. This is a my first programm. Created by HiNT & B0n@nz@. Language:russian. No trojans and viruses.
Platform: | Size: 10240 | Author: HiNT | Hits:

[OtherXcon2002_flashsky[1]

Description: 溢出植入型木马的实现,该木马稳定并且隐蔽。是不错的木马资料。-The realization of overrun implantable cardioverter Trojans, the Trojan horse stable and hidden. Trojan horse is a good information.
Platform: | Size: 152576 | Author: DouMen | Hits:

[Othervirus_removal

Description: 详细介绍了病毒和蠕虫的特征,根据特征可以查找木马和蠕虫,达到清除的目的。-Described in detail the characteristics of viruses and worms, according to characteristics of Trojans and worms can find to achieve clear objectives.
Platform: | Size: 610304 | Author: 吴方成 | Hits:

[Windows Developyixinch1

Description: 近期工作需要,需要更改远程桌面连接端口,网上的软件也不少,但下载下来有的总提示有病毒,由于在服务器使用,也不敢轻易使用,这样免费的软件总要绑定木马呢?既然想免费供大家使用,就应该真正的安全的供大家使用.根据更改远程连接端口的原理,即修改注册表两项REG_DWORD值,然后重启计算机即可完成-Recent work needs, need to change the Remote Desktop Connection port, web-based software, but do not down some general tips to download a virus, since the server is also not easy to use, so that free software always bound Trojans do? Now free for everyone to use, it should be a real safe for all to use. According to the principle to change the remote port, that is to modify the registry two REG_DWORD value, and then restart the computer to complete the
Platform: | Size: 34816 | Author: 郭郭 | Hits:

[Remote Controlyckz

Description: 可以如同木马一样控制客户机,并且... -Trojans can be the same as the control of the client, and ...
Platform: | Size: 334848 | Author: wenll998 | Hits:

[Windows DevelopLoadRemoteDll

Description: 如何向其他进程出入DLL的简单例子 呵呵 木马必备手段之一哟-How to access other processes, a simple example of DLL Trojans He He must have one of the means yo
Platform: | Size: 2288640 | Author: ew | Hits:

[Othermiansharumen

Description: 电子书,木马免杀入门-Trojans how to escaped anti-virus software
Platform: | Size: 21504 | Author: 元元 | Hits:

[File Operatefilehorse

Description: 获取文件信息的木马 适合初学者,高手绕过-The Trojans get file information for beginners, masters bypass
Platform: | Size: 3037184 | Author: 蒋和银 | Hits:

[Windows Developjianpanjilu

Description: 可以记录下你通过键盘所输入的内容,通常很多木马都用这中技术。-You can record the content entered by the keyboard, usually in a lot of Trojans have used the technology.
Platform: | Size: 297984 | Author: ly | Hits:

[Othertrojan

Description: 完整的木马程序,包含客户端和服务器端,功能模块比较完整-Complete Trojans, including client and server-side, a relatively complete functional modules
Platform: | Size: 63488 | Author: 刘盲森 | Hits:

[Otherwenjiankunbangqi

Description: 将多个文件合并成一个最终可执行文件,运行这个最终合成文件后,就相当于运行了合并前的多个文件,也就是文件捆绑,传说中文件捆绑器。这种程序在木马程序合并中会经常用到,你想知道它是怎么用程序实现的么?下面用VC6.0做的一个文件捆绑器的例子代码来演示一下-Multiple files into a final executable file, run the final synthesis document, the equivalent of running a number of documents prior to the merger, which is bundled files, legend files bundled device. This program will merge the Trojans often used, you want to know how it was achieved with a procedure What? Here' s a file to do with VC6.0 bundled device code to show you an example
Platform: | Size: 3799040 | Author: 郭子 | Hits:

[OS programhealyourass0

Description: 恢复被木马或病毒等劫持的文件关联,使exe程序恢复正常运行-Restore the Trojans or viruses hijacking file associations, so that the exe program can resume running normally...
Platform: | Size: 25600 | Author: 飘~ | Hits:

[Otherhacker_0point

Description: 阅读对象:初,中级黑客技术爱好者。本书的木马篇,工具篇篇,实战篇,主要为小刀会原创文章,文章以“入门到精通,基础+技巧”适用各类别读者。-Read objects: early, intermediate hacker technology enthusiasts. Trojans book chapter, tools, Sylvia, actual papers, mainly knives will original articles, the article to " Introduction to the proficient, basic+ skills" apply to all categories of readers.
Platform: | Size: 537600 | Author: 杨军 | Hits:

[Internet-NetworkGh0st3.6

Description: 一个完整的黑客木马程序,读者可以根据此资源完整的学习到木马程序以及类似程序的所以相关知识,包括网络,操作系统,文件的管理,端口等。。。本程序全可以实现-A complete hacker Trojan program, readers can learn to complete this resource Trojans and similar proceedings so the relevant knowledge, including network, operating system, file management, port and so on. . . This procedure can be achieved all
Platform: | Size: 1143808 | Author: 晓晓 | Hits:

[Bookstrojan

Description: 介绍常见木马的原理和编写技巧 分析常见木马的功能实现-Introduced the principle of common Trojans and Trojan preparation techniques of common realization of the function
Platform: | Size: 3195904 | Author: wang yun | Hits:

[OtherMalware

Description: 1- Malware is an abbreviation of malicious software which includes Trojans, viruses, worms, 2- Virus properties: a. Code portion that requires a host software (it infects other software and live on them) b. Requires a trigger (human action execution) to activate them. c. Has three main tasks: hiding, infection, damage (or job) d. It can change it’s shape/behavior to evade antiviruses.
Platform: | Size: 13312 | Author: mhdjamal | Hits:

[Game Programwanmei

Description: 完美系列全套游戏木马源码,完美国际木马,武林外传木马,新完美系列木马,诛仙木马。完整源码-Series complete game trojan source perfect, perfect international Trojans, Trojan Swordsman, a perfect series of new Trojans, Zhu Xian Trojan. Full Source
Platform: | Size: 2884608 | Author: 高大侠 | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 16 »

CodeBus www.codebus.net