Welcome![Sign In][Sign Up]
Location:
Search - PE

Search list

[BooksThe_PE_file_format

Description: pe文件格式(英文),可参考-pe document format (English), the reference
Platform: | Size: 23552 | Author: 何必呢 | Hits:

[Documentswin32_pe

Description: windows pe文件格式说明-windows pe File Formats
Platform: | Size: 31744 | Author: 陶正 | Hits:

[Linux-Unixwin_dump

Description: pe结构分析器windows界面-pe windows interface structure analyzer
Platform: | Size: 210944 | Author: 索骥超 | Hits:

[File FormatPEFile

Description: 专门介绍WINDOWS的PE文件格-devoted to the Windows PE file grid
Platform: | Size: 219136 | Author: 泽寒 | Hits:

[OS programPETool32src

Description: PE文件信息查看编辑工具,VC源码-View PE file information editing tools, VC FOSS
Platform: | Size: 49152 | Author: waterwhu | Hits:

[DocumentsPE檔案格式

Description: ProtoableEeec檔案格式-ProtoableEeec file format
Platform: | Size: 442368 | Author: 林敬宇 | Hits:

[Hook apipefile

Description: PE文件是windows(9598NT)目前采用的可执行文件格式。流行的CIH病毒就是通过改变PE文件的内容,并且保持文件大小不变,从而实现自己的功能。本程序通过分析PE文件格式,将可执行文件的文件定位表重新定位,指向用户编写的DLL,然后指令指针返回正常调用位置。在DLL中通过系统挂钩,实现了后台各种级别密码的截获功能。-PE document windows (9598NT) of the executable file format. Popular CIH virus is through changes in PE content of the document, and to maintain the size of the same document, thus achieving its own functions. The procedures by analyzing PE file format, the executable files repositioning positioning table, prepared by the user at DLL, and then returned to normal indicators directive calling location. The DLL system by linking the background to achieve various levels of password function intercepted.
Platform: | Size: 112640 | Author: 王峰 | Hits:

[BookspefileconConfidential

Description: 全面揭示PE文件的核心机密!彻底揭开PE结构的面纱!-comprehensive document reveals the core secrets! PE completely open structure of the veil!
Platform: | Size: 100352 | Author: 曾是命 | Hits:

[Communication最佳基带系统的Pe-EbN0曲线,

Description: 最佳基带系统的Pe-Eb/N0曲线,滚降系数0.5,取样时间偏差Ts/4.-best baseband system Pe-Eb/N0 curve, roll-off factor of 0.5, sampling time warp Ts/4.
Platform: | Size: 1024 | Author: 陈旭 | Hits:

[Crack Hackexebind

Description: pe文件2in1捆绑工具源代码!请用Delphi编译!-pe paper in 1 tool bundled source code! Please use the Delphi compiler!
Platform: | Size: 239616 | Author: dalao | Hits:

[Internet-Network镶入式后门程序源代码

Description: PE可执行文件的镶入式程序的编写方法及示例。注意:编译时注意安全。-PE executable files into the type of correction procedures and sample preparation methods. Note : compile-time pay attention to security.
Platform: | Size: 31744 | Author: 离心力 | Hits:

[assembly languagealink

Description: 著名的开源链接器,可链接obj和lib文件,目标格式可以是MSDOS COM、MSDOS EXE或Win32 PE文件-a famous opened linker can link both obj and lib texts , in which destination format can be MSDOS ,COM ,MSDOS,EXE or Win32 PE file
Platform: | Size: 187392 | Author: lgw | Hits:

[OtherGAYBIN

Description: 关于感染型病毒行为基本原理的源代码。 1、熟悉PE结构,掌握感染过程。 -virus infection on the behavior of the basic tenets of the source code. A familiar with the structure of PE, master infection process.
Platform: | Size: 5120 | Author: 谢斌 | Hits:

[assembly languagepe 文件编程:pe-locknt 的解密程序

Description: pe 文件编程:pe-locknt 的解密程序.rar-pe programming documents : pe-locknt the declassification procedures. Rar
Platform: | Size: 25600 | Author: 激活帐号 | Hits:

[OS programInjectPE

Description: 在exe文件引入表中挂接自定义的dll文件,可用于exe加密、制作插件等。。作者学习pe文件格式的成果,绝对原创!-exe files in the introduction of the table definition articulated since the dll file that can be used exe encryption, such as plug-in production. . Study author pe file formats the results absolute originality!
Platform: | Size: 2048 | Author: 倪玉龙 | Hits:

[Other《软件加密技术内幕》[配套光盘]

Description: 此为本书的配套光盘.本书结合实例,重点讲述了软件加密技术及其实施方案,以帮助程序员更好地保护自己的软件。书中介绍了相关系统的底层知识,例如,PE格式深入分析,调试API应用,未公开技术SEH的深入研究等,从而使读者在了解这些底层知识后,可以应用到自己的软件保护方案如各种反跟踪技术的实现中。本书还首度公开了如何编写加壳软件,以及如何将壳与程序融合在一起等一些热门技术。本书由加密解密技术界一流高手共同打造,读者将从本书中获得许多极具商业价值的内幕技术,是专业开发人员不可多得的一本好书。-this be supporting the CD. The book combines examples highlight of the software encryption technology, and its implementation program to help programmers to better protect their software. The book introduced the relevant knowledge of the underlying system, for example, PE format for in-depth analysis and debugging API application, but SEH undisclosed technology in-depth research, thus allowing readers to understand the underlying knowledge, can be applied to their own software to protect various programs, such as anti-tracking technology realization. The book is also the first time publicly how to prepare shell software, and how to shell and procedures for the integration of some other hot technology. The book by the encryption and decryption technology community together to create a first
Platform: | Size: 9389056 | Author: 陶立欣 | Hits:

[source in ebook软件加密原理与应用[配套光盘]

Description: 此为本书的配套光盘.本书不但由浅入深地讲解了软件保护技术,而且还精选并剖析了一些破解实例,并从一定的角度透视解密者的心态,在多处对照了软件保护与破解的思维方法。主要内容有:软件加密的发展历史、误区、方法,以及与特定语言相关的软件加密技术;破解技术剖析,以及常见的软件加密薄弱环节;PE技术、实战外壳加密与反脱壳技术(附大量示例源码),并提供了作者自己编写的小工具(加壳工具PEMaker等);调试技术与反调试技术(附大量示例源码);软件加密技巧与整体方案设计;加密锁分类及其使用技巧(智能卡加密锁)。-this be supporting the CD. The book not only elementary to explain the software protection technology, but also selected and analyzed some scary examples, and from a certain angle lens decryption of mentality in various control software protection and crack way of thinking. The main contents are : encryption software in the history of misunderstanding, methods, and with the specific language-related software encryption technology; Crack technical analysis, and common weak link encryption software; PE technology, real shell encryption technology and anti-sabot (A large sample source), and mention the author himself for the preparation of small tools (PEMaker shell tools, etc.); Debugging and anti-debugging techniques (A large sample source); software encryption techniques and overall progra
Platform: | Size: 13782016 | Author: 陶立欣 | Hits:

[Crack HackPEEncrypt_gb2312

Description: delphi语言,另有少量汇编代码,实现了PE文件的加密。-language, and another small amount of code compilation, achieved a PE file encryption.
Platform: | Size: 214016 | Author: npu | Hits:

[Other《加密与解密》随书光盘(一)演示

Description: 《加密与解密》第二版电子版 随书光盘(一)演示部分 2003年 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。从光盘上拷贝文件到硬盘时,要注意改变文件属性,取消“只读”属性。-"encryption and decryption," the second edition of the electronic version of books on CD-ROM (a) demonstration of some 2003 in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology. From the CD copy files to the hard drive, the at
Platform: | Size: 16355328 | Author: 张淼 | Hits:

[Other《加密与解密》随书光盘(二)工具

Description: 《加密与解密》随书光盘(二)工具 本书在第一版的基础上,更新了第一版中的过时内容。 本书共分三个部分。 第一部分介绍与加密和解密技术相关的基础知识。 第二部分全面讲述各种最新的软件加密与解密技术及方法,如静态分析技术,动态分析技术,序列号,警告窗口,时间限制,加密算法MD5、SHA、RSA、ElGanal等。 第三部分主要介绍PE文件的知识,如增加文件功能、加壳与脱壳、补丁技术等。-"Encryption and decryption" CD with the book (2) tools in the first edition of the book, on the basis of the update of the first edition of outdated content. The book is divided into three parts. The first part gives with the encryption and decryption technology-related knowledge. The second part of a comprehensive picture of all the latest software encryption and decryption technology and methods, such as static analysis, dynamic analysis, serial number, a warning window of time constraints, encryption algorithm MD5, SHA, RSA, ElGanal so. The third part introduces the knowledge PE documents, such as increased document functions, shell and sabot, patch technology.
Platform: | Size: 14485504 | Author: 张淼 | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net