Welcome![Sign In][Sign Up]
Location:
Search - Inject PE

Search list

[OS programPEInject

Description: 一般的为PE文件新增一个节的代码都是汇编代码,但是这是一个VC写的为PE文件新增一个节的代码,代码注释详尽!-General for the PE file add a section of the code are compiled code, but this is a VC for the PE file written in a new section of the code, the code detailed notes!
Platform: | Size: 3016704 | Author: 郭事业 | Hits:

[Windows Developpemaker

Description: 使用c++,向PE中注入代码 使病毒编写如此简单-Use c++, To the PE to inject code to enable the preparation of such a simple virus
Platform: | Size: 68608 | Author: 王力 | Hits:

[Documents11

Description: DLL注入,就把什么枚举进程、查找窗口和进程特权设置那西东西省了。 附件中带了一个testDll.dll,是我写的一个测试DLL,因为一般的DLL注入进去了可能没反应,所以在我写了个DLL,在里面加了MessageBox,可以弹出来,这样就知道DLL运行没有。DLL是VC++写的,因为我用的是VB迷你版,只能写ActiveX DLL,而这种DLL不能用来注入(我写了个,在Main函数里写了个MsgBox,启动对象设为 Sub Main,发现可以注入,但没有MsgBox出现),如果谁要DLL源码就回贴说,我发上来。-DLL injection, so what enumeration process, the search window and the process of setting privileges things that saved the West. Annex with a testDll.dll, I wrote a test DLL, because the DLL may be injected into the reaction, so I wrote a DLL, in which added a MessageBox, can pop up years, so know DLL Run no. DLL is VC++ Write, because I use the mini version of VB, only to write ActiveX DLL, and this DLL can not be used to inject (I wrote a month, in the Main function in writing a MsgBox, restart the object located for the Sub Main, discovery can be injected, but did not appear MsgBox), if the DLL source who said on Posted, me up.
Platform: | Size: 84992 | Author: 风尘小子 | Hits:

[OS programWritePE

Description: 改写PE文件,插入特定代码!静态注入,一个改写插入代码的例子!VS2005编译-Rewrite PE file, insert the specific code! Static injection, insert a rewritten code examples! VS2005 compiler
Platform: | Size: 13312 | Author: dapro | Hits:

[Shell apipemaker1

Description: 代码注入,PE文件添加新节 -Inject Your Code to a Portable Executable File
Platform: | Size: 56320 | Author: ccc | Hits:

[File Operatepemaker2

Description: 代码注入,PE文件添加新节 -Inject Your Code to a Portable Executable File
Platform: | Size: 59392 | Author: ccc | Hits:

[Windows DevelopKernelInject

Description: Winxp,Windows7通用内核注入DLL源码.利用PsSetLoadImageNotifyRoutine,修改PE输入表达到DLL注入目的-Kernel inject DLL
Platform: | Size: 44032 | Author: tzy | Hits:

[Delphi VCLpe-inject

Description: PE-inject PE注入 有说明和程序源码 国外代码-PE-inject is a special library which allows developers to place their own code into Windows executable files (EXE, DLL, OCX and others).
Platform: | Size: 372736 | Author: wl | Hits:

[Hook apix32_HookExp

Description: Inject easy pe-loader code into Explorer (x32) and load module in this process. Playload create in obj file(masm32), linked in Visual Studio
Platform: | Size: 29696 | Author: Genashk0 | Hits:

[OtherLoading-DLL-infect-PE

Description: C++ code to inject PE files (code injection)
Platform: | Size: 15360 | Author: John S. | Hits:

[OS programOther-Iniect

Description: 别类的的注入方法实现 (解析PE结构写入目标DLL)-othe inject HOOK
Platform: | Size: 4096 | Author: 任晓枫 | Hits:

[OtherPE-inject-in-head

Description: Simple PE infector contributing code in the header. Gratitude for: Sars / wasm and personal pr0m1x/EOF. Pre folder, create a folder C: \ Polygon Contamination will be conducted in order that there. In the bin folder to collect a01.exe infection.
Platform: | Size: 100352 | Author: anima | Hits:

[Windows DevelopBlackbone-master

Description: Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write virtual memory Process modules Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader list/Section objects/PE headers methods. Get exported function address Get the main module Unlink module from loader lists Inject and eject modules (including pure IL images) Inject 64bit modules into WOW64 processes Manually map native PE images Threads
Platform: | Size: 1496064 | Author: 3ackdoor | Hits:

[Game Programpe-inject

Description: It's a program for hack in game i hope you would like this, just open it and it's done
Platform: | Size: 372736 | Author: laksntm | Hits:

CodeBus www.codebus.net