Description: Network attack programs, MFC programming, we can see
To Search:
- [AppleVoter] - Graduation took a good design can be dir
- [guo360] - Tips over 360 security guards, over 360
- [NDISHooker] - MAC main breakthrough of this program is
- [ProtectFile] - The program features to prevent file del
- [wwwww] - Prohibition and start all network connec
- [ESCAN] - ESCAN is a fully designed and developed
- [ipc] - The latest compact source IPC Trojan gro
- [winpooch] - Winpooch is a Trojan horse virus securit
File list (Check if you may need any files):
网络攻击\tete\install.bat
........\....\ReadMe.txt
........\....\tete.exe
........\....\StdAfx.cpp
........\....\StdAfx.h
........\....\test.ini
........\....\tete.clw
........\....\tete.cpp
........\....\tete.dsp
........\....\tete.dsw
........\....\tete.ncb
........\....\tete.h
........\....\tete.rc
........\....\tete.plg
........\....\tete.aps
........\....\使用说明书.txt
........\....\程序需要完善的地方.txt
........\....\resource.h
........\....\teteDlg.cpp
........\....\system.ini
........\....\Tool\Tool.ini
........\....\....\remote\remote.ini
........\....\....\......\psexec.exe
........\....\....\......\psfile.exe
........\....\....\......\psgetsid.exe
........\....\....\......\psinfo.exe
........\....\....\......\radmin.exe
........\....\....\scan\scan.ini
........\....\....\exploit\exploit.ini
........\....\....\other\nc.exe
........\....\....\.....\shutdown.exe
........\....\....\.....\other.ini
........\....\....\attack\attack.ini
........\....\resourse\winxp.bmp
........\....\........\Thumbs.db
........\....\Attack\reboot.bat
........\....\......\backdoor.bat
........\....\......\telecontrol.bat
........\....\......\poweroff.bat
........\....\Pic\winxp.bmp
........\....\res\tete.ico
........\....\...\tete.rc2
........\....\...\winxp.bmp
........\....\teteDlg.h
........\....\Debug\tete.res
........\....\.....\vc60.idb
........\....\.....\tete.pch
........\....\.....\vc60.pdb
........\....\.....\StdAfx.sbr
........\....\.....\StdAfx.obj
........\....\.....\tete.sbr
........\....\.....\teteDlg.sbr
........\....\.....\teteDlg.obj
........\....\.....\tete.obj
........\....\.....\tete.ilk
........\....\.....\tete.exe
........\....\.....\tete.pdb
........\....\.....\tete.bsc
........\....\tete.opt
........\....\Tool\remote
........\....\....\scan
........\....\....\exploit
........\....\....\other
........\....\....\attack
........\....\Tool
........\....\resourse
........\....\Defence
........\....\Attack
........\....\Pic
........\....\res
........\....\Debug
........\tete
网络攻击