Welcome![Sign In][Sign Up]
Location:
Search - trojans

Search list

[Otheryuyuiuuuyt

Description: 计算机病毒与木马程序剖析(PDG),适合病毒爱好者学习-Analysis of computer viruses and Trojans (PDG), for studying the virus lovers
Platform: | Size: 6969344 | Author: 碧浪 | Hits:

[OS program200771213218694

Description: 此工具软件是针对网上流行的网页木马和插件进行免疫的程序,在ANI光标漏洞流传开以后,网上更是针对此漏洞制作的木马程序泛滥。 本软件就是把网上流行的木马利用漏洞禁止,这些功能对普通用户可以说是没有任何用处的。 软件还允许对所修改功能作取消操作,保证用户使用上不会有任何影响。 -This tool is popular for web pages and plug-ins Trojan immunization procedures, the ANI cursor vulnerability circulating after the line is produced for this vulnerability Trojans spread. This software is the popular online Trojan exploited ban, these features can be said for ordinary users without any help. Software also allows functions to cancel the changes, ensure that users will not have any impact.
Platform: | Size: 303104 | Author: x98188 | Hits:

[WEB Codetot-asp-scan

Description:   本程序可以扫描服务器上的所有指定类型(asp,cer,asa,cdx)的文件,查出可疑的木马程序。系统采用扫描程序与病毒库分离的形式, 以后升级只需像杀毒软件那样升级病毒库就可以了。目前可以查杀所有流行的ASP木马程序。   系统提供了全站扫描、按文件夹和指定文件扫描三种扫描方式,如果网站文件比较少的话,推荐使用"全站扫描",如果文件比较多,推荐 使用按文件夹扫描。扫描过程,系统会记录被扫描过的文件列表,同时对怀疑是木马程序的文件以列表的形式展现,为了便于比较最近有可能 被上传过ASP木马程序,系统特别对当前时间7日内修改、创建的文件以加红显示;系统会对怀疑是木马的文件作出"级别"判断,并加以颜色区分 ;建议对级别为"一般"的程序作手动检查后,再作处理,对级别为"严重"的文件,可以点击"文件名称"下的文件链接,一般打开后木马程序都会 有一个登录提示,这时就点击"文件名称"下的"删除"链接,直接将文件从服务器中删除即可。如果担心会误删除,可以先点击"下载"将文件备份。-The program can scan all of the specified server type (asp, cer, asa, cdx) files, to identify suspicious Trojan. System uses scanner and virus database in the form of separation, Just like anti-virus software after the upgrade as upgrade virus database on it. Can now killing all the popularity of ASP Trojans. System provides the station scan, according to the specified file folders and three kinds of scan mode scanning, less if the site files, then recommended "full stop scan", if the file is more recommended Use by scanning the folder. Scanning process, the system will record a list of files to be scanned the same time, is suspected of Trojan files in the form of a list showing, in order to facilitate during the recent You may ASP Trojans are uploaded, the system in particular, within 7 days of the current time changes, create the file to add red display system suspected to be the Trojan file will make "level" to judge and make color-coded Recommended level is "normal"
Platform: | Size: 14336 | Author: zuimeng | Hits:

[Anti-virusmianyimuma

Description: 可免疫一些木马的源代码-Some Trojans may be the source code of the immune ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Platform: | Size: 2048 | Author: 坠落@承诺 | Hits:

[Windows Developvbouto

Description: 是你的VB程序后台自动运行的源码,希望大家研究下,不要用于木马程序-The background of your VB program to run automatically the source code, I hope you study, do not for Trojans
Platform: | Size: 3072 | Author: 邹浩 | Hits:

[WEB CodeCodeSecurity

Description: 能对主流的php木马进行扫描和提示。 根据匹配的次数和危险程度排序后,可以有效发现木马-Php mainstream Trojan can scan and tips. According to the matching frequency and risk ranking, the Trojans can find
Platform: | Size: 321536 | Author: 卫洪杰 | Hits:

[Hook apitinglong

Description: 天龙八部,木马,学习研究用,hook,visual c-Tian Long Ba Bu, Trojans, study and research use, hook,
Platform: | Size: 126976 | Author: 徐亮 | Hits:

[Hook apijianpanmajiascq

Description: 键盘马,做游戏木马,可写生成器~不错的源码,需要的同学收藏~-Keyboard horses, play games Trojans can sketch synthesizers ~ good source, students need to collections ~
Platform: | Size: 1977344 | Author: your name | Hits:

[Hook apijianpanhuodeaip

Description: HOOK源码钩子,貌似木马的样子,不要做坏事哦,不然小心警察-HOOK source hook, looks like Trojans, do not do bad things, otherwise you care policeman ~ ~
Platform: | Size: 45056 | Author: your name | Hits:

[Driver DevelopRootKit_pediy

Description: 来自看雪的RootKit的学习与研究专题的电子书。 Rootkit是什么?估计很多朋友并不明白,简单的说,Rootkit是一种特殊的恶意软件,它的功能是在安装目标上隐藏自身及指定的文件、进程和网络链接等信息,比较多见到的是Rootkit一般都和木马、后门等其他恶意程序结合使用。Rootkit通过加载特殊的驱动,修改系统内核,进而达到隐藏信息的目的。技术是双刃剑,我们研究它的目的在于,透过我们的研究,用这项技术来保护我们的系统,使我们的系统更加健壮,充分发挥这个技术的正面应用。-RootKit see snow from the study and research the topic e-books. Rootkit What is it? Estimate many of my friends do not understand, simply, Rootkit is a special kind of malicious software, and its function is to hide itself in the installation and specify the target file, processes and Web links and other information, see the more general Rootkit are, and Trojans, backdoor and other malicious programs used in combination. Rootkit by loading special drivers, modify the system kernel, thus achieving the purpose of hidden information. Technology is double-edged sword, and we study it aims, through our research, using this technology to protect our systems to make our system more robust, give full play to the positive application of this technology.
Platform: | Size: 1954816 | Author: vivi | Hits:

[WEB Codecockhorse

Description: 一个ASP木马程序的源代码,包括文件上传,邮件收发等-A compilation of trojans using ASP code
Platform: | Size: 10240 | Author: flyhiger | Hits:

[JSP/JavaOchronaDanych

Description: Find a bad programs in hard drive and delete trojans , java !
Platform: | Size: 40960 | Author: upulse313 | Hits:

[CSharpdllmuma

Description: DLL在程序编制中可作出巨大贡献,它提供了具共性代码的复用能力。但是,正如一门高深的武学,若被掌握在正义之侠的手上,便可助其仗义江湖;但若被掌握在邪恶之徒的手上,则必然在江湖上掀起腥风血雨。DLL正是一种这样的武学。DLL一旦染上了魔性,就不再是正常的DLL程序,而是DLL木马,一种恶贯满盈的病毒,令特洛伊一夜之间国破家亡-DLL in the program can make a significant contribution to the establishment, which provides a common code reuse capabilities. However, as a profound martial art, if they are to grasp the hands of justice Xia, rivers and lakes can help their sense of justice if is mastered in the hands of evil, then certainly set off a reign of terror in the rivers and lakes. DLL is one such martial. Once infected with the magic of the DLL, the DLL is no longer the normal procedure, but the DLL Trojans, a wicked virus, so that the country seen their homes destroyed overnight death of Troy
Platform: | Size: 9216 | Author: hkj | Hits:

[Windows Developclose

Description: 找到运行程序的路径.!然后关闭选择的程序!可以查杀木马用-Find the path to run the program.! Then close the selected program! Trojans can be used killing
Platform: | Size: 13312 | Author: lun | Hits:

[OS program201012114204669

Description: 卓然主动防御源码(可执行文件+完整源码+完整作品报告,卓然驱动级云安全主动防御系统 目录 开发目的 2 系统特性 4 一. 使用RootiKit技术,精确拦截木马,曝光恶意行为 4 二. 提供详细行为描述信息,帮助用户判断 4 三. 云安全概念融入,精确判断文件安全级别 4 四. 支持白名单、黑名单,引入云规则,减少提醒 4 五. 多模块相互配合,将木马及其衍生物一网打尽 4 -Zoran active defense source (executable+ source+ complete works full report, Zoran driver-level cloud security system directory was developed to active defense system features 4 a 2. Use RootiKit technology, precision intercept Trojans, 4 second exposure of malicious behavior. Provide detailed behavior description to help users determine the 4 III. the concept of security into the cloud, file security level to determine exactly 4 IV. supports whitelists, blacklists, rules for the introduction of the cloud, reducing to remind 4 five. multi-module complement each other, the Trojan and its derivatives Clean Sweep 4
Platform: | Size: 2699264 | Author: 李学兵 | Hits:

[Internet-Networkdggfd

Description: 马免杀技术详解 前几次发过一些免杀的灰鸽子,经过测试都能正常上线,很多HACKER朋友虽然知道很多入侵技巧,但是木马免杀却不懂的,这使的很多跨站挂马的朋友丢失了好多珍贵的可以入侵的计算机!很多朋友就问了:你是怎么做到免杀的呢? 我就告诉大家木马如何做到免杀!大家只要记好下面的四句免杀秘诀,按照下面的步骤来处理木马程序,我相信大家也能打造无敌的免杀木马! 1--去头加花改入口 2--修改特征过杀软 3--加区建表重载入 4--加密加壳终极法 -Detailed Ma technology to avoid killing some previous hair gray to avoid killing pigeons, can be properly tested on the line, a lot of friends that knows a lot of intrusion HACKER skills, but they did not know the horse to avoid killing, which makes a lot of cross-site linked to the horse lost a lot of valuable friends to the invasion of the computer! many of my friends to ask: how do you do to avoid killing? I' ll tell you how to do to avoid killing Trojans! as long as you remember well the following four free kill the tips, the following steps to deal with Trojans, I believe we could create a Trojan horse to avoid killing the invincible! 1- to change the entrance to the first plus to spend 2- modify the characteristics of soft kill off 3- Canadian District in overload table into 4- ultimate packer encryption method
Platform: | Size: 2048 | Author: libai | Hits:

[Software EngineeringTIMTENpingbirenwuguanliqi

Description: 由TIMTEN·KILL我制作的任务管理器屏蔽源码,是学做木马的小菜们必会的一招-Produced by the TIMTEN · KILL my task manager screen source, is to learn to do the dishes Trojans will have a stroke will
Platform: | Size: 6241280 | Author: TIMTEN | Hits:

[OS program007

Description: 随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、木马、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强大。-With the development of the computer more and more people were using personal computers, while the mainstream operating system is Microsoft s Windows. The operating system, PC operating system market occupies 90 or more. But the problem has cropped up more and more of the platform for viruses, Trojans, hacker programs, malware, rogue software and spyware, theft and destruction of user data. Study found that most of these illegal programs is through the registry to achieve from the start. So long as we block access to the registry the program can be launched against them to achieve the purpose of the protection of user data. In this design, the technology used SSDT Hook to intercept access to the registry. The interception technology universal and powerful.
Platform: | Size: 2985984 | Author: ZYM | Hits:

[Windows Developmumadaima.txt.tar

Description: 本文档为用VB写的本分木马程序的代码,-This document is written using VB code sub Trojans. . . . . .
Platform: | Size: 5120 | Author: stone | Hits:

[Scanner2

Description: 通过检测注册表实现监控木马的效果,功能很强大,希望对大家有所帮助-Trojans by detecting the effect of the registry to achieve control, very powerful, we want to help
Platform: | Size: 294912 | Author: qwertty | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 15 16 »

CodeBus www.codebus.net