Location:
Search - memory inject
Search list
Description: MSSniffer的源代码,一个基于对话框程序的网络监听器,可以对监听的数据包进行分析,如其IP,端口,ACK等。-MSSniffer source code, a dialog-based network monitoring program, you can monitor packets on the analysis, if the IP, port, ACK and so on.
Platform: |
Size: 4023296 |
Author: xaiaoshqiaon |
Hits:
Description: an injector for memory modification and for dll s that needs an injector. so if you need the injector here it is
Platform: |
Size: 388096 |
Author: ssnow19741 |
Hits:
Description: Call of Duty 4 cheat source code, includes some memory hacks and D3D. Works for version 1.7
Uses Xfire to inject itself
Platform: |
Size: 631808 |
Author: Trouble |
Hits:
Description: 内存读写类,可以用来注入用,用起来十分方便,适合初学者,呵呵!-Memory, reading and writing classes, can be used to inject use them very convenient to use, suitable for beginners, Ha ha!
Platform: |
Size: 31744 |
Author: xusir98 |
Hits:
Description: Code injection, this is a code for hooking the process memory.
Platform: |
Size: 1024 |
Author: marius89 |
Hits:
Description: 远程线程注入木马c++代码。远程线程插入(注入)技术指的是通过在另一个进程中创建远程线程的方法进入目标进程的内存地址空间。将木马程序以DLL的形式实现后,需要使用插入到目标进程中的远程线程将该木马DLL插入到目标进程的地址空间,即利用该线程通过调用Windows API LoadLibrary函数来加载木马DLL,从而实现木马对系统的侵害。
-Remote thread injecting Trojan c++ code. Remote thread injection ( injection ) technology refers to the process by another method of creating distance thread into the target process of memory address space. The Trojans in the form of DLL implementation, requiring the use of inserted into the target process in remote thread the Trojan DLL inserted into the target address space of a process, namely the use of the thread by calling the Windows API LoadLibrary function to load a Trojan DLL, thereby realizing the system against trojan.
Platform: |
Size: 46080 |
Author: 陈嘉 |
Hits:
Description: 外挂作坊所有的注入例程,有分层注入,钩子注入,连环注入,输入法注入,网络注入,线程注入,新进程注入,注入内存DLL对于新手提高有帮助-Plug workshops injection routine, stratified injection hook into comic injected input method injection network inject threads into the new process injection, inject memory DLL for the novice to improve
Platform: |
Size: 35840 |
Author: 张俊 |
Hits:
Description: Inject a hwpoison memory failure on a arbitrary pfn
Platform: |
Size: 1024 |
Author: riekevi |
Hits:
Description: 关于用中断向量表来更改系统中断,及将其注入内存中-On the use of the interrupt vector table to change the system interruption, and to inject it into memory
Platform: |
Size: 70656 |
Author: huangyi |
Hits:
Description: 哈弗曼加密程序 哈弗曼加密程序--Plug workshops injection routine, stratified injection hook into comic injected input method injection network inject threads into the new process injection, inject memory DLL for the novice to improve
Platform: |
Size: 289792 |
Author: mggdx |
Hits:
Description: MODULE PARM DESC for Linux v2.13.6.
Platform: |
Size: 1024 |
Author: bongyonqo |
Hits:
Description: Inject a hwpoison memory failure on a arbitrary pfn.
Platform: |
Size: 1024 |
Author: qtcongzai |
Hits:
Description: 内存注入模块,用来注入游戏什么的都可以-Memory injection module, used to inject the game what can
Platform: |
Size: 8192 |
Author: 李小姐 |
Hits:
Description: Binding for dual-GPIO LED found on Network Space v2 (and parents).
Platform: |
Size: 1024 |
Author: nuicangcr |
Hits:
Description: .子程序 标题取窗口句柄, 整数型, 公开, 根据窗口标题和类名获取窗口句柄,成功返回句柄,失败返回0或-1
.参数 窗口标题, 文本型, , 窗口标题
.参数 窗口类名, 文本型, 可空, 窗口标题
.子程序 内存注入dll, 整数型, 公开, 被注入的dll不能加强壳 必须静态编译 不能使用部分窗口组件
.参数 窗口句柄, 整数型, , 欲注入DLL的进程的窗口句柄
.参数 欲注入的字节集, 字节集, , 欲注入的DLL字节集
-. subroutine title to take the window handle, integer type, open, according to the window title and the name of the class to get the window handle successfully returns a handle failure returns 0 or- 1
Parameters window title, text type, window title
. parameters of the window class name, text type, empty, window title
. subprogram memory into the DLL, integer type, open, was injected into the DLL cannot strengthen the shell must be statically compiled can not use part of the window component
Parameter window handle, integer type, to be injected into the process of DLL window handle
The parameter to be injected into the byte set, the byte set, want to inject the DLL byte set
Platform: |
Size: 8192 |
Author: mochi |
Hits:
Description: Process interaction
Manage PEB32/PEB64
Manage process through WOW64 barrier
Process Memory
Allocate and free virtual memory
Change memory protection
Read/Write virtual memory
Process modules
Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader list/Section objects/PE headers methods.
Get exported function address
Get the main module
Unlink module from loader lists
Inject and eject modules (including pure IL images)
Inject 64bit modules into WOW64 processes
Manually map native PE images
Threads
Platform: |
Size: 1496064 |
Author: 3ackdoor
|
Hits:
Description: 易语言注入进程源码例程程序调用API函数打开进程内存,将代码注入到进程中并运行。
本易语言源码例程属于易语言高级教程。(The source code routine program of the easy language injection process calls the API function to open process memory, inject the code into the process and run.
This language source code routine belongs to the advanced language course.)
Platform: |
Size: 5120 |
Author: wzqone |
Hits: