Description: Win32 Kernel Rootkits modify the behaviou r of the system by Native Kernel API hooking. Thi 's technique is typically implemented by modify ing the ServiceTable entries in the Service Des criptor Table (SDT). on the hook
- [obj2asm] - Source code to change .obj to assembly l
- [bankingbusinesssimulation.Rar] - data structure curriculum design, a simp
- [InsidetheNativeAPI] - declassified, want to learn windows API
- [kilster] - use of thread scheduling Chain link to t
- [hookN] - foreign collected more than hook code Le
- [Agony] - hidden documents, the registry, port, th
- [TaskMgr.exe] - very classical source. Achieved all the
- [truecryptsc] - paper-driven process can be used to hide
- [RootKit] - rootkit technology, welcome to download,
- [HookAPI] - HookAPIProcessGuard is a realization of
File list (Check if you may need any files):