Location:
Search - anti trojan
Search list
Description: 防PHP木马脚本.php 防PHP木马脚本.php有效防PHP木马!-Trojan defense PHP script. Php Trojan defense PHP script. Php effective anti - PHP Trojan!
Platform: |
Size: 2106 |
Author: dongh |
Hits:
Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB / CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy -- defense network scanning the realization Computer Virus Scan Extraction
Platform: |
Size: 506249 |
Author: hulipeng |
Hits:
Description: 现在的木马后门种类非常之多,其中有些木马专门以Office 文档为窃取目标,我最近做了一些Anti这些木马的工作,在工作中我基本上实现了阻止未知程序利用Office自动化接口窃取Word内容,但限于公司利益我只能写一些基本上已经比较成熟和公开的技术,当然其中了包含我的设计思想,我想多多少少会让你有所收获,你可任意转载文章,但请注明作者和出处,谢谢!-the backdoor Trojan so many types, Some Trojan specifically to steal Office documents, I have recently done some of these Trojan Anti work, at work I basically realized unknown procedures to prevent the use of Office Automation Interface theft Word, but limited to the interests of the company I can basically write some more mature and open technology, of course, which includes the design, I thought, I want to give you something to gain something, you can freely reproduced articles, but please indicate the source and author, thank you!
Platform: |
Size: 16179 |
Author: hello |
Hits:
Description: 反连木马,大家可以参考一下其中的思想,产生两个管道,一个读一个写,在winnt,win2000,win20003,winxp些没有问题-even anti-Trojan, we can make reference to the idea of having two pipelines, one reading a written, winnt, WIN2000, win20003, winxp no more problems
Platform: |
Size: 11301 |
Author: bei |
Hits:
Description: 反连木马,大家可以参考一下其中的思想,产生两个管道,一个读一个写,在winnt,win2000,win20003,winxp些没有问题-even anti-Trojan, we can make reference to the idea of having two pipelines, one reading a written, winnt, WIN2000, win20003, winxp no more problems
Platform: |
Size: 11264 |
Author: bei |
Hits:
Description: 防PHP木马脚本.php 防PHP木马脚本.php有效防PHP木马!-Trojan defense PHP script. Php Trojan defense PHP script. Php effective anti- PHP Trojan!
Platform: |
Size: 2048 |
Author: |
Hits:
Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB/CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy-- defense network scanning the realization Computer Virus Scan Extraction
Platform: |
Size: 505856 |
Author: hulipeng |
Hits:
Description: 现在的木马后门种类非常之多,其中有些木马专门以Office 文档为窃取目标,我最近做了一些Anti这些木马的工作,在工作中我基本上实现了阻止未知程序利用Office自动化接口窃取Word内容,但限于公司利益我只能写一些基本上已经比较成熟和公开的技术,当然其中了包含我的设计思想,我想多多少少会让你有所收获,你可任意转载文章,但请注明作者和出处,谢谢!-the backdoor Trojan so many types, Some Trojan specifically to steal Office documents, I have recently done some of these Trojan Anti work, at work I basically realized unknown procedures to prevent the use of Office Automation Interface theft Word, but limited to the interests of the company I can basically write some more mature and open technology, of course, which includes the design, I thought, I want to give you something to gain something, you can freely reproduced articles, but please indicate the source and author, thank you!
Platform: |
Size: 16384 |
Author: hello |
Hits:
Description: exe作成服务启动的代码,简单的c语言编写,是实现程序(木马)自启动的最好方式,能够逃脱杀毒软件的监视!-exe startup code to make service, the simple c languages, is the realization of program (Trojan) Self-starting the best way to escape the surveillance of anti-virus software!
Platform: |
Size: 2048 |
Author: 卢伟 |
Hits:
Description: 阻挡autorun病毒的工具
对计算机每个盘处理一下,可防很多木马病毒-Autorun virus blocking tools on the computer disk to deal with each click can be a lot of anti-Trojan
Platform: |
Size: 19456 |
Author: zhou xiaoxiao |
Hits:
Description: 主要进行木马杀毒,可以用于u盘杀毒。这样可以有效地进行u盘木马杀毒-Mainly Trojan antivirus, anti-virus can be used for u disk. This can effectively u disk Trojan antivirus
Platform: |
Size: 3072 |
Author: 加林 |
Hits:
Description: 杀木马程序源代码-Trojans kill the source code
Platform: |
Size: 3397632 |
Author: sp |
Hits:
Description: 详细介绍计算机病毒与反病毒技术,第1章 计算机病毒概述第2章 预备知识 第3章 计算机病毒的逻辑结构与基本机制 第4章 DOS病毒的基本原理与DOS病毒分析 第5章 Windows病毒分析 第6章 网络蠕虫 第7章 特洛伊木马 第8章 计算机病毒常用技术综述第9章 计算机病毒的检测、清除与免疫 第10章 Unix_Linux病毒与手机病毒简介-Details of computer viruses and anti-virus technology, a computer virus Chapter 1 Overview Chapter 2 prior knowledge of computer viruses in Chapter 3 of the logic of the structure and basic mechanism of Chapter 4 of the basic principles of DOS virus DOS virus and analysis of Chapter 5 Analysis of the first Windows virus Chapter 6 Internet worms Chapter 7 Trojan horse computer virus Chapter 8 Summary of commonly used technologies Chapter 9 of the computer virus detection, removal and immune Chapter 10 Unix_Linux HIV virus and cell phone profile
Platform: |
Size: 1254400 |
Author: hwl |
Hits:
Description: 名称:反特洛伊木马
功能:
1、禁用自启动项目(run runonce runservices)
2、禁止修改.txt、.com、.exe、.inf、.ini、.bat等等文件关联
3、禁止修改"服务"信息
原理:设置注册表权限为只读
-Name: Anti-Trojan Features: 1, disabled since the launch of the project (run runonce runservices) 2, against change. Txt,. Com,. Exe,. Inf,. Ini,. Bat file association, etc. 3, prohibits modification " services" Information theory: Setting registry permissions to read-only
Platform: |
Size: 2048 |
Author: 李蛋蛋 |
Hits:
Description: 病毒和木马防护ATV安全卫士源代码,本站再发布一款关于病毒和木马防护的源代码,作者叫ATV安全卫士,呵呵,不是360安全卫士。这个源代码虽然功能还不是很强大, 但已经完整具有了专业杀毒防护的功能,比如内嵌的主动防御系统、防火墙、强力移除系统、病毒库升级等等。甚至界面也做的比较有模有样。托盘提醒,网络即时防护功能也做的不错,目前这个是1.02版本,作者已经发布了2.0版本,随后如果作者源代码发布的话本站也进行发出来。-Virus and Trojan protection ATV safety guard source code, the site and then release a virus and trojan protection on the source code of the security guards called the ATV, Oh, not the 360 security guards. Although the function of the source code is not very powerful, but has a complete anti-virus protection with the professional features such as embedded active defense system, firewall, force removal system, the virus database upgrade and so on. Even the interface has to do more with shape. Tray to remind, the network real-time protection also doing well, the current version is 1.02, the author has released version 2.0, then if the author released the source code, then also sent to this site.
Platform: |
Size: 544768 |
Author: 李学兵 |
Hits:
Description: 本文主要介绍了运用可执行文件的内核数字签名测试技术来进行木马检测的技术-Anti-Trojan and Trojan Detection with
In-Kernel Digital Signature testing of
Executables.
Platform: |
Size: 26624 |
Author: 李健 |
Hits:
Description: 批量修改,修改删马,最新免杀asp木马,asp大马,asp提权大马,asp防删隐藏木马,asp不死复活木马,asp.net木马,防删ASP木马,免杀asp木马-Batch Edit, modify delete horses, the latest Trojan to avoid killing asp, asp Malaysia, asp mention the right Malaysia, asp delete hidden anti-Trojan, asp immortal resurrection Trojans, asp.net trojan, anti trojan deleted ASP, free to kill asp Trojan
Platform: |
Size: 67584 |
Author: 东东 |
Hits:
Description: Belyash Anti-Trojan Antivirus
Platform: |
Size: 4553728 |
Author: kaqudie |
Hits:
Description: 1.无级分类栏目。智能化设计,用户只要输入最少参数,支持自定义URL。
2.高级编辑器,记录采用审核制,审核后方可显示。
3.多级管理员。站长具有全部权限;高级管理员可以审核记录,删除记录,编辑记录的权限;普通管理员可以增加记录的权限。
4.上传文件防木马设计。对上传的图片文件,如发现疑似木马病毒,系统将自动删除。
5.函数调用格式,提供多种方式的首页,方便用户修改。-1. stepless Categories. Intelligent design, users simply enter a minimum of parameters, support for custom URL.
2. Senior Editor, are recorded by the audit system, only show after review.
3. Multi-level administrator. Master has full rights senior administrator can review records, delete records, edit records authority general administrator privileges can add records.
4. Anti-Trojan designed to upload files. Uploaded image file, such as a suspected Trojan, will be automatically deleted.
5. Function call, provide a variety of ways home, user modification.
Platform: |
Size: 499712 |
Author: 蒋 |
Hits:
Description: 《木马攻防全攻略》融合了作者多年的研究成果,真实再现了木马配置、伪装、防杀、植入的全过程,深入浅出地讲解了如“反弹连接”、“线程插入”、“隧道技术”、“键盘记录”、“特征码修改”、“添加花指令”等热点问题,解决困挠大多数木马研究者的疑问。-" Trojan Raiders offensive and defensive" combines the results of years of research, a true representation of Trojan configuration, camouflage, anti-killing, implantation of the whole process, as explained in layman' s language " bounce connected" , " thread insert," " tunneling" " keyloggers" , " signature Edit" , " add junk code" and other hot issues, resolve questions plague most of the Trojans researchers.
Platform: |
Size: 43906048 |
Author: Thomas |
Hits: