搜索资源列表
4444
- 剔除电影中暗藏*的应对策略,也是一份上好的黑客资料。-Excluding the movie hidden Trojan coping strategies, is also a good hacking information on the.
shangxin
- 可以用来清除垃圾,*,很不错的源码,适合初学者仿写-Can be used to clear the garbage, Trojan horses, very good source
shell_pipe
- 这是两个简单*的源程序,单双匿名管道远程获取Shell cmd.-These are two simple trojan source, single and double pipe remote anonymous access to Shell cmd.
mmjhmm
- ASP*加密*大师可以把你的ASP加密,让 黑客看不懂,或让你的*不让站长发觉。 -ASP Trojan free to kill the master encryption can encrypt your ASP, so that hackers can not read, or make your horse not to find owners.
bsl
- 《蓝色防线》主要有“网站安全查询”、“垃圾网站屏蔽”、“IE修复锁定”、“*云查杀”和“安全百宝箱”五大功能。这其中,“网站安全查询”调用的是“诺顿安全网址查询”的查询结果,它同时包含网站预览截图功能,可以在浏览网站前先了解网页大致内容;而“*云查杀”则是调用在线多杀毒引擎文件检测,实现传说中的“云查杀”。-" Blue line" main " website security check,"
four_Trojans
- 几个经典的反弹*源代码,其中有些代码有点小错,代码也很老了,不过代码精炼,功能具备,有借鉴意义-The rebound of several classic Trojan source code, some code a little wrong, the code is also very old, but refining the code, function in place, there is reference
CF
- CF最新窗口化 无毒的 无*程序 好看又使用的源码-CF window of the latest non-toxic and good-looking Trojan horse program source code used
13
- 这是一个基于特洛伊*的毕业论文,比较有参考价值,采用了线程注入技术和socket编程技术。可以进行一定程度的远程控制。-This is a Trojan horse-based dissertation, compare a reference value, using the thread implantation technique and socket programming. Can be a degree of remote
14
- 基于VC的一种*实现方法,可以作为本科阶段的毕业论文,采用C/S模式,可以传送命令,进行远程控制。-VC-based implementations of a Trojan can be used as undergraduate thesis, the use of C/S mode, you can send commands to the remote control.
zeus
- 价值5000元的黑客工具包Zeus源代码 -Value of 5,000 yuan Zeus source code hacking toolkit
KeyLogger
- 本项目采用钩子函数实现的*器,实现盗取账号与密码。在设计中,以*功能为中心,用自动运行功能与自动隐藏功能去完善整个*程序的设计。-This project uses the hook function keyloggers implemented to achieve steal account and password. In the design, in order to record the keyboard as
Trojan-horse
- 可以作为初学者调试了解*之用,其中的模块代表性极强-Trojans can be understood as a beginner debugging, of which a strong representation of the module
DT
- 静态*检测源码 本项目基于扩展攻击树的静态*检测 提供白名单功能 不需要数据库,相关数据量比较少,全部内嵌在代码中 makefile都写好了,windows下nmake就是了-Trojan detection of static source code of this project is based on extended attack tree Trojan detection provides static f
HACK
- 黑客零起点”网络手册1.常用命令与IP表 2.*篇 3.工具篇 4.实战篇 5.安全文摘篇 6.论坛文摘 阅读对象:初,中级黑客技术爱好者。本书的*篇,工具篇篇,实战篇,主要为小刀会原创文章,文章以“入门到精通,基础+技巧”适用各类别读者。 -Hacking beginners " Network Guide 1. Frequently used commands and the IP Table 2. Tro
CSharp-code
- C#远程控制*分析等,7个C#的远程控制*源码程序-C# Remote Control Trojans analysis, 7 C# source code for remote control Trojan horse program
CSharpcode
- C#开发的键盘鼠标记录器(源码),大家学习下。多提意见-C# Remote Control Trojans analysis, 7 C# source code for remote control Trojan horse program
nb5.5
- NB远程控制源码。。研究远程控制*编程的有用-NB remote control source. . Study the usefulness of remote control Trojan programming
the-detection-of-kernel-rootkit
- 内核脱钩技术在检测rootkit*信息隐藏中的应用-Decoupling in the detection of kernel rootkit trojan application of information hiding
ScriptTrojanKiller
- 一款比较简单的脚本*的查杀工具,可以扫描出一些有一些特征的脚本*,特征码可以自己进行添加-A relatively simple scr ipt Trojan killing tools, you can scan some of the characteristics of the scr ipt has some Trojans, his signature can be added
object
- 一个完整的*源代码、功能一般,可以拿来学习-A complete Trojan source code, function normally, can be used to study