Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - Anti
Search - Anti - List
反调试的dll,大家试试吧,呵呵,很好用的哦-anti-debugging dll, we try it, Oh, oh, the good
Update : 2025-02-17 Size : 2kb Publisher : 蓝帝

画反锯齿直线、矩形、弧线、曲线的demo,-Anti-aliased line drawing, rectangle, arc, curve of the demo,
Update : 2025-02-17 Size : 24kb Publisher : 樊新宜

Kaspersky Anti Virus v7.0.0.125 Key
Update : 2025-02-17 Size : 2kb Publisher : 赵立杰

Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序-Adaptive Splitting Protocols for RFID tag Collision Arbitration procedures for anti-collision algorithm
Update : 2025-02-17 Size : 1.11mb Publisher : linda

DL : 0
通信协议扫描_反垃圾邮件技术,pdf格式,希望对研究反垃圾邮件的朋友有所帮助-Communication protocol scan _ anti-spam technology, pdf format, and they hope to study anti-spam friends help
Update : 2025-02-17 Size : 38kb Publisher : 郭玉璞

Anti-Unpacking... 反脱壳示例 ├──FileSize...........用文件大小校验软件 └──FileCRC32..........校验文件完整性-Anti-Unpacking ... anti-shell sample ├ ─ ─ FileSize ........... check software using file size └ ─ ─ FileCRC32 .......... File Integrity Check
Update : 2025-02-17 Size : 705kb Publisher : 王刚

反静态分析示例 ├──Example1...........一般程序示例 ├──Example2...........插入花指令示例 └──Example3...........12组花指令-Examples of anti-static analysis ├ ─ ─ Example1 ........... example of the general procedure ├ ─ ─ Example2 ........... insert junk code sample └ ─ ─ Example3 ..... Group took command ...... 12
Update : 2025-02-17 Size : 501kb Publisher : 王刚

Anti-DeDe... .....Anti-DeDe示例 ├──Find...............查找进程和窗口 └──Hide...............隐藏事件-Anti-DeDe ... ..... Anti-DeDe example ├ ─ ─ Find ............... search process and the window └ ─ ─ Hide ........ Hide events .......
Update : 2025-02-17 Size : 334kb Publisher : 王刚

Anti-Loader... ...Anti-Loader示例 ├──PEB................利用TEB检测 ├──FindWindow.........查找句柄检测 ├──IsDebuggerPresent..利用IsDebuggerPresent检测 ├──Parent.............检查父进程 └──STARTUPINFO........检查STARTUPINFO结构-Anti-Loader ... ... Anti-Loader example ├ ─ ─ PEB ................ use TEB detection ├ ─ ─ FindWindow ......... Find Detection handle ├ ─ ─ IsDebuggerPresent .. use IsDebuggerPresent detection ├ ─ ─ Parent ............. parent process checks └ ─ ─ STARTUPINFO ........ check STARTUPINFO structure
Update : 2025-02-17 Size : 826kb Publisher : 王刚

掌握反病毒知识 熟悉反病毒工具的使用 培养现场反病毒应急响应能力 -Grasp the knowledge of anti-virus anti-virus tools are familiar with the use of culture-site anti-virus emergency response capacity
Update : 2025-02-17 Size : 1004kb Publisher : he

反调试演示.-Anti-debugging demonstration.
Update : 2025-02-17 Size : 6kb Publisher : vilysoft

Anti-Emulator code (can bypass BitDefender, Kaspersky, and VBA32)
Update : 2025-02-17 Size : 1kb Publisher : vxhunter

Anti-ReverseEngineeringGuide.rar IsDebuggerPresent() EPROCESS Structure...etc-Anti-ReverseEngineeringGuide.rar IsDebuggerPresent() EPROCESS Structure...etc..
Update : 2025-02-17 Size : 514kb Publisher : lks

使用Delphi实现的19种反调试检测法源代码-Use Delphi to achieve 19 kinds of anti-debugging detection source code
Update : 2025-02-17 Size : 3kb Publisher : 由安

ANTI THEFT ALARM SCHEMATIC DESIGN FILE
Update : 2025-02-17 Size : 26kb Publisher : tomy

鸽子的Anti单元 仅供参考学习 -鸽子的Anti单元 仅供参考学习
Update : 2025-02-17 Size : 3kb Publisher : 王一

本文将对当今先进的病毒/反病毒技术做全面而细致的介绍,重点当然放在了反病毒上,特别是虚拟机和实时监控技术。文中首先介 绍几种当今较为流行的病毒技术,包括获取系统核心态特权级,驻留,截获系统操作,变形和加密等。然后分五节详细讨论虚拟机 技术:第一节简单介绍一下虚拟机的概论;第二节介绍加密变形病毒,作者会分析两个著名变形病毒的解密子;第三节是虚拟机实 现技术详解,其中会对两种不同方案进行比较,同时将剖析一个查毒用虚拟机的总体控制结构;第四节主要是对特定指令处理函数 的分析;最后在第五节中列出了一些反虚拟执行技术做为今后改进的参照。论文的第三章主要介绍实时监控技术,由于win9x和 winnt/2000系统机制和驱动模型不同,所以会分成两个操作系统进行讨论。其中涉及的技术很广泛:包括驱动编程技术,文件钩挂, 特权级间通信等等。本文介绍的技术涉及操作系统底层机制,难度较大。所提供的代码,包括一个虚拟机C语言源代码和两个病毒 实时监控驱动程序反汇编代码,具有一定的研究和实用价值。-This paper will today s advanced virus/anti-virus technology to do a comprehensive and detailed introduction, the focus of course on the anti-virus, especially the virtual machines and real-time monitoring technology. Firstly Introduction Several of today s more popular Shao-virus technology, including access to the system kernel mode privilege level, presence of intercepted system operation, deformation and encryption. Five sections and then discuss in detail the virtual machine Technology: the first a brief overview of the virtual machine Section II describes the deformation encrypted virus, the author analyzes the deformation of the virus to decrypt two famous son III is the virtual machine implementation Detailed current technology, which will compare two different programs, and will dissect a virus scanning of virtual machines with the overall control structure fourth main function is to deal with specific instructions Analysis Finally, in section V lists some of the a
Update : 2025-02-17 Size : 146kb Publisher : 陈伟

DL : 0
iphone 反走样 源代码 iphone sdk 4.0 最新特性-iphone anti-aliased source file
Update : 2025-02-17 Size : 22kb Publisher : lili

this document is a source for rfid anti-collision algorithm in multi-tag systems. this algorithm is based on aloha protocol that is very popular today beacuse of it easiness and simplification. such protocol has used in all active RFID designs.
Update : 2025-02-17 Size : 120kb Publisher : david

本源码利用检测两个时间点的时间差判断出该程序是否被暂停!达到反调试的作用-Detection of the source using time difference of two points in time determine whether the program is suspended! To the role of anti-debugging
Update : 2025-02-17 Size : 2kb Publisher : Love0101
« 12 3 4 5 6 7 8 9 10 ... 50 »
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.