Location:
Search - memory dll
Search list
Description: 摘 要: 本文介绍了DLL技术在Windows编程中的基本运用方法及应用,给出了直接内存 访问及端口I/O的两个实用DLL的全部源代码。-Abstract : This paper presents a DLL in Windows programming using the basic method and the application is a direct memory access and I/O port in the two all practical DLL source code.
Platform: |
Size: 4096 |
Author: 康怀杰 |
Hits:
Description: 共享DLL中的变量,可以让多个程序共用一个程序.-shared DLL variables, which allows multiple processes to share a procedure.
Platform: |
Size: 52224 |
Author: hayes |
Hits:
Description: 这个程序是我尝试使用dll共享内存段的代码。当多个程序调用dll时,dll中会产生一块所有程序可以访问的内存块,可用于用于进程通信和控制。-this procedure is to try to use the shared memory of the dll code. When the number of procedures called dll, dll will have an all procedures can access blocks of memory, process can be used for communication and control.
Platform: |
Size: 75776 |
Author: 姚秋林 |
Hits:
Description: 从内存中加载DLL和EXE文件,支持压缩的文件.-From memory to load DLL and EXE files, compressed file support.
Platform: |
Size: 5767168 |
Author: 李林 |
Hits:
Description: 内存画图DLL,可以快速画出圆,矩形,三角,多边形等常见的图形以及各种曲线-Memory drawing DLL, can quickly draw circle, rectangle, triangle, polygon, such as graphics and a variety of common curve
Platform: |
Size: 343040 |
Author: yangnix |
Hits:
Description: 在C#中使内存映射文件方式进行文件读写, 文件读写功能由一个C++写的DLL提供. 附件内含有完整的DLL工程和C#调用工程.-In the C# Make the memory-mapped files of papers to read and write, file read and write function by a C++ Provide written DLL. Annex DLL contains a complete engineering and C# Call works.
Platform: |
Size: 38912 |
Author: 张鲁夺 |
Hits:
Description: 《精灵复兴》北斗的第一个外挂源代码
里面包括了EXE注入 功能DLL 和找内存地址- Wizard renaissance Beidou s first plug-in source code which includes the EXE and DLL injection function to find the memory address
Platform: |
Size: 109568 |
Author: fwefwef |
Hits:
Description: dll 动态加载类的简单例子. 类中只有两个虚函数:Create() 和 Destroy().-class loaded dynamically in dll.
Only 2 virtual functions are important in this class: Create() and Destroy(). Create() function returns TRUE if the DLL is loaded correctly and an instance handle obtained. Destroy() will unload the DLL from process memory.
Platform: |
Size: 11264 |
Author: wowbellon |
Hits:
Description: Load a Dll From memory
Platform: |
Size: 4096 |
Author: vvj |
Hits:
Description: loading dll from memory
Platform: |
Size: 23552 |
Author: freeq |
Hits:
Description: dll劫持,delphi源码,对破解很有用,功能和内存补丁是一样的,不过比内存补丁那种生成一个exe文件比起来好了很多了,有兴趣的可以自己慢慢研究!~-dll hijack, delphi source code, to crack very useful, functionality and memory patches are the same, but more than the memory patch exe file that generates a much better compared to, and are interested in studying in yourself! ~
Platform: |
Size: 513024 |
Author: 胡小 |
Hits:
Description: load a dll from resource to memory without writting to disk
Platform: |
Size: 4096 |
Author: UnNamed053 |
Hits:
Description: 可以吧dll注入到进程内存中执行,不是普通的iat 注入,非常好用-Dll can be injected into the process memory it performed, not the ordinary into the iat, very easy to use
Platform: |
Size: 43008 |
Author: mrhts |
Hits:
Description: 动态链接库英文为DLL,是Dynamic Link Library 的缩写形式,DLL是一个包含可由多个程序同时使用的代码和数据的库,DLL不是可执行文件。动态链接提供了一种方法,使进程可以调用不属于其可执行代码的函数。函数的可执行代码位于一个 DLL 中,该 DLL 包含一个或多个已被编译、链接并与使用它们的进程分开存储的函数。DLL 还有助于共享数据和资源。多个应用程序可同时访问内存中单个DLL 副本的内容。DLL 是一个包含可由多个程序同时使用的代码和数据的库。-English dynamic link library DLL, a short form of Dynamic Link Library DLL is a library DLL is not an executable file containing code and data used by multiple programs at the same time. The dynamic link provides a way, so that the process can call a function that does not belong to the executable code. The executable code of the function is located in a DLL, the DLL contains one or more of the function has already been compiled, linked and are separated with the process using them stored. The DLL also helps to share data and resources. Multiple applications can access the contents of a single copy of the DLL in memory. DLL is a library of code and data used by multiple programs at the same time.
Platform: |
Size: 787456 |
Author: wzhm |
Hits:
Description: 《内存DLL操作支持库》含例子源码和演示录像-" Memory DLL operation support library" containing examples of source code and demo video
Platform: |
Size: 4217856 |
Author: 流通横 |
Hits:
Description: _内存注入DLL(_ memory into the DLL)
Platform: |
Size: 18432 |
Author: care
|
Hits:
Description: .版本 2
hFile = CreateFileA (strFileName, #GENERIC_READ, #FILE_SHARE_READ, 0, #OPEN_EXISTING, #FILE_ATTRIBUTE_NORMAL, 0)
.如果真 (hFile = -1)
返回 (假)
.如果真结束
pFileBuff = 0
nFileSize = GetFileSize (hFile, 0)
.如果真 (nFileSize = 0)
返回 (假)
.如果真结束
pFileBuff = VirtualAlloc (0, nFileSize, #MEM_COMMIT, #PAGE_EXECUTE_READWRITE)
dwReadSize = 0
.如果真 (ReadFile (hFile, pFileBuff, nFileSize, dwReadSize, 0) = 假)
返回 (假)
.如果真结束
pBase = pFileBuff
' 判断是否是PE
p强转数组 [1] = 强制转换 (pIDH, pFileBuff)
.如果真 (pIDH.e_magic ≠ 23117)
返回 (假)
.如果真结束
ptmp = pFileBuff + 读内存整数型 (-1, pFileBuff + 60)
p强转数组 [2] = 强制转换 (pINH, ptmp)
.如果真 (pINH.Signature ≠ 17744)
返回 (假)
.如果真结束
dwMemSize = nFileSize
pAllocMem = pFileBuff
强制转换 (pIDH, p强转数组 [1])
强制转换 (pINH, p强转数组 [2])
返回 (真)(Version 2
HFile = CreateFileA (strFileName, #GENERIC_READ, #FILE_SHARE_READ, 0, #OPEN_EXISTING, #FILE_ATTRIBUTE_NORMAL, 0)
If true (hFile = -1)
Return (false)
If it is over
PFileBuff = 0
NFileSize = GetFileSize (hFile, 0)
If true (nFileSize = 0)
Return (false)
If it is over
PFileBuff = VirtualAlloc (0, nFileSize, #MEM_COMMIT, #PAGE_EXECUTE_READWRITE)
DwReadSize = 0
If true (ReadFile (hFile, pFileBuff, nFileSize, dwReadSize, 0) = false)
Return (false)
If it is over
PBase = pFileBuff
'whether the judgment is PE
P strong turn array [1] = forced conversion (pIDH, pFileBuff)
If (pIDH.e_magic = 23117)
Return (false)
If it is over
PTMP = PFileBuff read memory integer type (-1, PFileBuff60)
P strong turn array [2] = forced conversion (pINH, PTMP)
If (pINH.Signature = 17744)
Return (false)
If it is over
DwMemSize = nFileSize
PAllocMem = pFileBuff
Forced conversion (pIDH, P strong turn array [1])
Forced conversion (pINH, P strong turn array [2])
Return to (true))
Platform: |
Size: 38912 |
Author: 额反反复复
|
Hits:
Description: 本文在VB中应用动态链接库unzip32.dll中函数Wiz_UnzipToMemory,在内存中进行数据解压缩。(This article applies dynamic link library unzip32.dll function Wiz_UnzipToMemory in VB, decompress in memory.)
Platform: |
Size: 132096 |
Author: czcjy123
|
Hits:
Description: 通用DLL注入器9种注入方法可以实现内存,注册表,远程,钩子注入等方式(General DLL injector 9 injection method can realize remote memory, registry, and hook into etc.)
Platform: |
Size: 1340416 |
Author: 沫妍 |
Hits:
Description: 易语言模块源码:线程DLL注入,内存DLL注入,内存读写,线程操作(Easy language module source code: thread DLL injection, memory DLL injection, memory read and write, thread operation)
Platform: |
Size: 315392 |
Author: GMin |
Hits:
« 12
3
4
5
6
7
8
9
10
...
18
»