Welcome![Sign In][Sign Up]
Location:
Search - bo2k

Search list

[Windows Developbo2k115_source

Description: 其名的BO2K源码,反弹式木马源码 好好学习,天天向上! 不用多说,好东东!-their names BO2K source, rebound-Trojan source to learn and every day! Needless to say, good Dong!
Platform: | Size: 1164111 | Author: 喂工 | Hits:

[WinSock-NDISbo2k1-3_beta4

Description: 著名的BO2K远程控制工具的源码著名的BO2K远程控制工具的源码
Platform: | Size: 709491 | Author: wcy | Hits:

[Remote Controlbo2ksrc

Description: 著名木马BackOrifice 2000 (BO2K)的源代码-famous Trojan Back 2000 (BO2K) source code
Platform: | Size: 605003 | Author: 不羁的风 | Hits:

[WinSock-NDIS20040810403412389

Description: bo2k,从事局域网,Internet,流媒体技术,嵌入式开发-bo2k engaged LAN, the Internet, streaming media technology, embedded development
Platform: | Size: 502466 | Author: 麦迪 | Hits:

[Remote Controlbo2ksrc

Description: bo2000木马程序源码 -Libraray of bo2k
Platform: | Size: 0 | Author: 站长 | Hits:

[Applicationsbo2ksrc

Description: 著名黑客软件backorifice的源代码--Source code of famous hacker software backorifice
Platform: | Size: 400384 | Author: 站长 | Hits:

[Remote Controlbo2ksrc

Description: 著名木马BackOrifice 2000 (BO2K)的源代码-famous Trojan Back 2000 (BO2K) source code
Platform: | Size: 605184 | Author: 不羁的风 | Hits:

[Internet-Network20040810403412389

Description: bo2k,从事局域网,Internet,流媒体技术,嵌入式开发-bo2k engaged LAN, the Internet, streaming media technology, embedded development
Platform: | Size: 501760 | Author: | Hits:

[Windows Developbo2k115_source

Description:
Platform: | Size: 1164288 | Author: 喂工 | Hits:

[Internet-Networkbo2k1-3_beta4

Description: 著名的BO2K远程控制工具的源码著名的BO2K远程控制工具的源码-BO2K famous source remote control tool for the well-known BO2K source remote control tools
Platform: | Size: 709632 | Author: wcy | Hits:

[Technology Managementbo2ksdk_1.0

Description: bo2k document for network developer
Platform: | Size: 28672 | Author: ali | Hits:

[Remote Controlbo2k1-3_beta5_src

Description: BO2K-SRC Back Orifice 2000 is the most powerful network administration tool available for the Microsoft environment, bar none
Platform: | Size: 439296 | Author: qiujun | Hits:

[Compress-Decompress algrithmsbo2k115_source

Description: 著名BO2K源码下载。。供研究学习只用,不能用于邪恶途径-Known BO2K source code download. . Learning for research use only, not for evil ways
Platform: | Size: 1697792 | Author: 天天 | Hits:

[Software Engineeringbo2kdocument

Description: 大名鼎鼎的木马bo2k的说明文档,介绍bo2k的开发过程-Trojan bo2k the famous description of the document to introduce the development process bo2k
Platform: | Size: 155648 | Author: fk | Hits:

[Internet-NetworkBO2K

Description: BO2K全名为Back Orifice 2000,是一个名为“死牛之祭”的黑客组织发布的。它是一个可以搜集信息,执行系统命令,重新设置机器,重新定向网络的客户端/服务器应用程序。-BO2K full name of the Back Orifice 2000, is a " Rite of dead cattle," the hackers released. It is a can collect information, perform system commands, reset the machine, re-directed network client/server applications.
Platform: | Size: 905216 | Author: 张羽翀 | Hits:

[Internet-NetworkBackOrifice2000_Src

Description: 老牌著名黑客工具BackOrifice2000源代码作为黑客工具,Bo2K去年曾经大出风头, 其实他实质上是一个远程控制工具,而且源码全部公开 BO2K is a remote administration tool. It comes with a client and a server. The server is lightweight and inobtrusive. A dynamic plugin architechture allows for easy system extension. It wants to be ported to other operating systems. (coming soon)-BackOrifice2000 source code for the old well-known hacker tools as hacking tools, Bo2K last year that steal the show, in fact, he is essentially a remote control tool, and source all publicly Back Orifice is a remote administration tool. It comes with a client and a the server at The the server is lightweight and inobtrusive. A dynamic plugin architechture allows for easy system extension. It wants to be ported to other operating systems. (coming soon)
Platform: | Size: 775168 | Author: 伊东 | Hits:

[Othermumachengxudeshejiyushixian

Description: 本文在研究著名木马BO2K技术的基础上设计了一款远程控制木马。该木马程序能够通过客户端对远程主机进行控制和监视,服务端可以自动连接客户端。另外该木马程序还包括远程文件操作(文件复制、拷贝、删除、下载、上传等),远程系统控制(重启、屏幕锁定、启动项管理),网络连接控制,远程进程管理和键盘监控等功能。最后本文实现了这一款木马程序,并对其进行了测试。测试结果显示该木马程序实现了所有的功能,能够对远程主机进行控制。-This paper studies the famous Trojan BO2K technology, based on the design of a remote control Trojans. The Trojans through client to control and monitor remote host, the server can automatically connect to the client. Also the Trojan also includes a remote file operations (file copy, copy, delete, download, upload, etc.), remote system control (restart, lock screen, Startup Manager), internet access control, remote process management and keyboard monitoring. Finally, we realized that a Trojan horse program, and tested it. Test results show that the Trojan implements all the functions that can be controlled on the remote host.
Platform: | Size: 256000 | Author: 吴丹 | Hits:

[OtherBo2K loader

Description: 不创建进程,直接可以在内存加载pe文件,不使用Loadlibrary,直接在内存中展开加载(Do not create a process, you can directly load PE files in memory, do not use Loadlibrary, directly in memory expansion load)
Platform: | Size: 10240 | Author: 嗷叫 | Hits:

CodeBus www.codebus.net