Location:
Search - anti
Search list
Description: 反调试的dll,大家试试吧,呵呵,很好用的哦-anti-debugging dll, we try it, Oh, oh, the good
Platform: |
Size: 2048 |
Author: 蓝帝 |
Hits:
Description: 画反锯齿直线、矩形、弧线、曲线的demo,-Anti-aliased line drawing, rectangle, arc, curve of the demo,
Platform: |
Size: 24576 |
Author: 樊新宜 |
Hits:
Description: Kaspersky Anti Virus v7.0.0.125 Key
Platform: |
Size: 2048 |
Author: 赵立杰 |
Hits:
Description: Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序-Adaptive Splitting Protocols for RFID tag Collision Arbitration procedures for anti-collision algorithm
Platform: |
Size: 1161216 |
Author: linda |
Hits:
Description: 通信协议扫描_反垃圾邮件技术,pdf格式,希望对研究反垃圾邮件的朋友有所帮助-Communication protocol scan _ anti-spam technology, pdf format, and they hope to study anti-spam friends help
Platform: |
Size: 38912 |
Author: 郭玉璞 |
Hits:
Description: Anti-Unpacking... 反脱壳示例
├──FileSize...........用文件大小校验软件
└──FileCRC32..........校验文件完整性-Anti-Unpacking ... anti-shell sample ├ ─ ─ FileSize ........... check software using file size └ ─ ─ FileCRC32 .......... File Integrity Check
Platform: |
Size: 721920 |
Author: 王刚 |
Hits:
Description: 反静态分析示例
├──Example1...........一般程序示例
├──Example2...........插入花指令示例
└──Example3...........12组花指令-Examples of anti-static analysis ├ ─ ─ Example1 ........... example of the general procedure ├ ─ ─ Example2 ........... insert junk code sample └ ─ ─ Example3 ..... Group took command ...... 12
Platform: |
Size: 513024 |
Author: 王刚 |
Hits:
Description: Anti-DeDe... .....Anti-DeDe示例
├──Find...............查找进程和窗口
└──Hide...............隐藏事件-Anti-DeDe ... ..... Anti-DeDe example ├ ─ ─ Find ............... search process and the window └ ─ ─ Hide ........ Hide events .......
Platform: |
Size: 342016 |
Author: 王刚 |
Hits:
Description: Anti-Loader... ...Anti-Loader示例
├──PEB................利用TEB检测
├──FindWindow.........查找句柄检测
├──IsDebuggerPresent..利用IsDebuggerPresent检测
├──Parent.............检查父进程
└──STARTUPINFO........检查STARTUPINFO结构-Anti-Loader ... ... Anti-Loader example ├ ─ ─ PEB ................ use TEB detection ├ ─ ─ FindWindow ......... Find Detection handle ├ ─ ─ IsDebuggerPresent .. use IsDebuggerPresent detection ├ ─ ─ Parent ............. parent process checks └ ─ ─ STARTUPINFO ........ check STARTUPINFO structure
Platform: |
Size: 845824 |
Author: 王刚 |
Hits:
Description: 掌握反病毒知识
熟悉反病毒工具的使用
培养现场反病毒应急响应能力
-Grasp the knowledge of anti-virus anti-virus tools are familiar with the use of culture-site anti-virus emergency response capacity
Platform: |
Size: 1028096 |
Author: he |
Hits:
Description: 反调试演示.-Anti-debugging demonstration.
Platform: |
Size: 6144 |
Author: vilysoft |
Hits:
Description: Anti-Emulator code (can bypass BitDefender, Kaspersky, and VBA32)
Platform: |
Size: 1024 |
Author: vxhunter |
Hits:
Description: Anti-ReverseEngineeringGuide.rar
IsDebuggerPresent() EPROCESS Structure...etc-Anti-ReverseEngineeringGuide.rar
IsDebuggerPresent() EPROCESS Structure...etc..
Platform: |
Size: 526336 |
Author: lks |
Hits:
Description: 使用Delphi实现的19种反调试检测法源代码-Use Delphi to achieve 19 kinds of anti-debugging detection source code
Platform: |
Size: 3072 |
Author: 由安 |
Hits:
Description: ANTI THEFT ALARM SCHEMATIC DESIGN FILE
Platform: |
Size: 26624 |
Author: tomy |
Hits:
Description: 鸽子的Anti单元
仅供参考学习 -鸽子的Anti单元
仅供参考学习
Platform: |
Size: 3072 |
Author: 王一 |
Hits:
Description: 本文将对当今先进的病毒/反病毒技术做全面而细致的介绍,重点当然放在了反病毒上,特别是虚拟机和实时监控技术。文中首先介
绍几种当今较为流行的病毒技术,包括获取系统核心态特权级,驻留,截获系统操作,变形和加密等。然后分五节详细讨论虚拟机
技术:第一节简单介绍一下虚拟机的概论;第二节介绍加密变形病毒,作者会分析两个著名变形病毒的解密子;第三节是虚拟机实
现技术详解,其中会对两种不同方案进行比较,同时将剖析一个查毒用虚拟机的总体控制结构;第四节主要是对特定指令处理函数
的分析;最后在第五节中列出了一些反虚拟执行技术做为今后改进的参照。论文的第三章主要介绍实时监控技术,由于win9x和
winnt/2000系统机制和驱动模型不同,所以会分成两个操作系统进行讨论。其中涉及的技术很广泛:包括驱动编程技术,文件钩挂,
特权级间通信等等。本文介绍的技术涉及操作系统底层机制,难度较大。所提供的代码,包括一个虚拟机C语言源代码和两个病毒
实时监控驱动程序反汇编代码,具有一定的研究和实用价值。-This paper will today s advanced virus/anti-virus technology to do a comprehensive and detailed introduction, the focus of course on the anti-virus, especially the virtual machines and real-time monitoring technology. Firstly Introduction
Several of today s more popular Shao-virus technology, including access to the system kernel mode privilege level, presence of intercepted system operation, deformation and encryption. Five sections and then discuss in detail the virtual machine
Technology: the first a brief overview of the virtual machine Section II describes the deformation encrypted virus, the author analyzes the deformation of the virus to decrypt two famous son III is the virtual machine implementation
Detailed current technology, which will compare two different programs, and will dissect a virus scanning of virtual machines with the overall control structure fourth main function is to deal with specific instructions
Analysis Finally, in section V lists some of the a
Platform: |
Size: 149504 |
Author: 陈伟 |
Hits:
Description: iphone 反走样 源代码 iphone sdk 4.0 最新特性-iphone anti-aliased source file
Platform: |
Size: 22528 |
Author: lili |
Hits:
Description: this document is a source for rfid anti-collision algorithm in multi-tag systems. this algorithm is based on aloha protocol that is very popular today beacuse of it easiness and simplification. such protocol has used in all active RFID designs.
Platform: |
Size: 122880 |
Author: david |
Hits:
Description: 本源码利用检测两个时间点的时间差判断出该程序是否被暂停!达到反调试的作用-Detection of the source using time difference of two points in time determine whether the program is suspended! To the role of anti-debugging
Platform: |
Size: 2048 |
Author: Love0101 |
Hits:
« 12
3
4
5
6
7
8
9
10
...
50
»