Welcome![Sign In][Sign Up]
Location:
Search - code hacking

Search list

[JSPJava_application_development_security

Description: 本书以循序渐进的方式教授您如何防御最新的基于Java的攻击,让您透彻理解黑客的邪恶方法和思考过程。通过贯穿全书的Java和J2EE实际可用代码,您将目睹真实世界中的黑客事件并学习相应对策。-Step by step book to teach you how to defense the latest Java-based attacks, allowing you to thoroughly understand the hacker' s evil methods and thinking processes. Throughout the book by the actual Java and J2EE code available, you will see the real world events and learn hacking countermeasures.
Platform: | Size: 15628288 | Author: chenpeibin | Hits:

[Internet-Networkhackerresourse

Description: 黑客攻击常用的工具及其源码实例,能够帮助大家认识黑客。-Common hacking tools and source code examples to help you understand hackers.
Platform: | Size: 19612672 | Author: 徐万新 | Hits:

[Windows DevelopHackingExposed10

Description: HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like-HACKING IIS 5 IISsecurity exploits have enjoyed a long,rich tradition. Microsoft’s flag ship Webserver platform has been plagued by such vulnerabilities as source code revelati on attacks like......
Platform: | Size: 1068032 | Author: samshop | Hits:

[Remote Control003

Description: visual c++黑客编程揭秘与防范源代码,主要是一个完整的远程控制控制程序的VC源代码-visual c++ programming Secret and prevent hacking source code, the main remote control is a complete source code control program of the VC
Platform: | Size: 7877632 | Author: Snake | Hits:

[Hook apioksoft_wn_daima

Description: 万能盗号精灵III全套源代码 包括注册机代码 以及监控程序代码,参数配置程序代码等. -Universal hacking Wizard III includes full source code and control code Keygen codes, parameter configuration program code.
Platform: | Size: 726016 | Author: 古金 | Hits:

[OtherHacker-Disassembling-Uncovered

Description: 详细介绍了如何在没有源代码的情况下使用调试器和反汇编器对程序进行分析,揭示了各种各样的破解方法。-This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
Platform: | Size: 4947968 | Author: 闫煜 | Hits:

[Windows DevelopHacker-Disassembling-Uncovered

Description: This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more. -This text shows how to analyze programs without its source code, using a debugger and a disassembler, and covers hacking methods including virtual functions, local and global variables, branching, loops, objects and their hierarchy, and more.
Platform: | Size: 4947968 | Author: 金帅 | Hits:

[Internet-Networkhackerkemppronoun

Description: 世界黑客编程大赛冠军代码,很不错,该代码会自动运行,可以自动穿越隧道-Programming hacking code for the world championship, very good, the code will automatically run through the tunnel automatically
Platform: | Size: 15360 | Author: 黄飞鸿 | Hits:

[Remote ControlPeerYou

Description: 代码名称:PeerYou远程控制软件,稍加处理可为非常强大的黑客软件 关键代码:完全实现注册表处理,文件处理。服务端采用多线程服务,能最好的处理 SOCKET请求。数据接收、发送函数可以说是现阶段最好的,采用异步重叠 操作。 -Code Name: PeerYou remote control software, a little deal for a very powerful hacking software key code: the full realization of registry processing, document processing. Multi-threaded server services can best handle SOCKET request. Data receive and send functions can be said at this stage the best use of asynchronous overlapping operations.
Platform: | Size: 208896 | Author: 李明 | Hits:

[File OperateVC-zishanchu

Description: vc6.0 做的自删除文件的程序,windows黑客编程中的代码。-vc6.0 do delete files from the program, windows hacking programming code.
Platform: | Size: 2048 | Author: 张宁 | Hits:

[Otherqkdym

Description: 可以取宽带用户名、密码,对于忘了密码的人很重要,也是黑客常用的工具之一。(PS:这个是DLL源码)。-Can take the broadband user name and password for forgotten password, it is very important, but also one of the tools commonly used in hacking. (PS: This is the DLL source code).
Platform: | Size: 11264 | Author: tiang | Hits:

[Windows DevelopNumberRain

Description: 实现数字雨的黑客效果源代码,使用的是windows API 编程。-Hacking digital rain effect source code, using windows API programming.
Platform: | Size: 11406336 | Author: fangying | Hits:

[e-language1111

Description: cf外挂8.0源代码易语言制作源码简单易用易作-Cf hacking the source code
Platform: | Size: 235520 | Author: 爱文轩 | Hits:

[e-languageEasyLanguage

Description: 地下城游戏盗号易语言源码利用地下城游戏的外挂可以盗所有地下城号.-Game hacking underground city underground city is easy to use language the game source code plug-in can steal all the underground city numbers.
Platform: | Size: 532480 | Author: 小孩 | Hits:

[OtherKris-Kaspersky

Description: 很多人认为,黑客行为(Hacking)是不道德的,而本书作者Kris Kaspersky认为,这有失公允。黑客行为其实是天性不安分的人的一种本能,此类人天生就爱破解谜题,并乐此不疲。他们与那些以牟利或伤害他人为目标的“黑客”们,根本就是两码事。所以,本书既不是一本破解代码的技术手册,也不是一本关于反黑客的防护手册,本书可以看做是一位喜欢刨根问底的自由主义者的学习笔记。你可以跟随他的脚步,考察Intel编译器,洞悉商业程序的保护机制,学习使用反汇编器与调试器。在第二版中,添加了一些新内容,比如克服反调试技术、探查经过打包、加密、异化或者混淆的代码等。-A lot of people think, hacking ( Hacking ) is unethical, and the author of the book Kris Kaspersky thought, which is unfair. Hacking is actually the nature not law-abiding person s one kind of instinct, such people are naturally love decipher puzzles, and always enjoy it. They and those for profit or harm to others as the goal of" hacker", is not the same thing. Therefore, this book is neither a crack the code of technical manuals, nor about the anti-hacker protection manual, the book can be seen as a bit like get to the bottom of liberal learning notes. You can follow in his footsteps, investigates the Intel compiler, insight into the commercial program protection mechanism, learning to use the disassembler and debugger. In the second edition, add some new content, such as overcoming anti-debugging techniques, exploration after packing, encryption, alienation or confused code.
Platform: | Size: 15076352 | Author: 王追 | Hits:

[assembly languagexfocus

Description: 1、定位 全方位、非商业而且有自己独特风格的黑客及安全站点。 2、目的 a、整理和发掘网络安全、黑客方面技术文献及工具、代码。 b、发布我们——包括任何一个对安全有想法的朋友——的想法和发现,为大家提供发布文章及安全、黑客相关工具的园地。 c、结识更多有共同志向的朋友,共同研究、讨论网络安全的方方面面。 -1, positioning All-round, non-commercial and has its own unique style of hacking and security sites. 2, the purpose of a, organize and explore the network security, hacker tools for technical documentation and code. b, release us- including the idea of ​ ​ any security with a friend- ideas and discoveries, as we publish articles and provide security, hacking tools of garden. c, a common ambition to get to know more friends, to study, discuss all aspects of network security.
Platform: | Size: 18674688 | Author: | Hits:

[Hook apiSrc

Description: 以前学习PE格式和游戏外挂还有病毒的时候写的一个半成品.主要功能有PE查看器.进程浏览器.内存修改器,以及网络嗅探器. DLL注入,代码注入,键盘记录-Before learning PE format and game hacking and when the virus writing a semi-finished products. The main function have PE viewer. Process the browser. Memory modifier, and network sniffer. DLL injection, code injection, the keyboard record
Platform: | Size: 317440 | Author: 禁区 | Hits:

[Other2

Description: 一个用c写的自动关机程序,让操作的人选择一个东西,然后自动执行。简单的黑客代码。-Write a c automatic shutdown procedures, operations people choose one thing and then run automatically. Simple hacking code.
Platform: | Size: 4096 | Author: | Hits:

[Internet-NetworkBackOrifice2000_Src

Description: 老牌著名黑客工具BackOrifice2000源代码作为黑客工具,Bo2K去年曾经大出风头, 其实他实质上是一个远程控制工具,而且源码全部公开 BO2K is a remote administration tool. It comes with a client and a server. The server is lightweight and inobtrusive. A dynamic plugin architechture allows for easy system extension. It wants to be ported to other operating systems. (coming soon)-BackOrifice2000 source code for the old well-known hacker tools as hacking tools, Bo2K last year that steal the show, in fact, he is essentially a remote control tool, and source all publicly Back Orifice is a remote administration tool. It comes with a client and a the server at The the server is lightweight and inobtrusive. A dynamic plugin architechture allows for easy system extension. It wants to be ported to other operating systems. (coming soon)
Platform: | Size: 775168 | Author: 伊东 | Hits:

[Internet-Networkyiyuyandaohao

Description: 易语言详细制作盗号软件+源代码,很有用,值得一看-Easy language details making hacking software the+ source code, useful, worth a visit
Platform: | Size: 58368 | Author: 123 | Hits:
« 1 2 3 45 6 »

CodeBus www.codebus.net