Welcome![Sign In][Sign Up]
Location:
Search - memory inject

Search list

[Sniffer Package captureMSSniffer

Description: MSSniffer的源代码,一个基于对话框程序的网络监听器,可以对监听的数据包进行分析,如其IP,端口,ACK等。-MSSniffer source code, a dialog-based network monitoring program, you can monitor packets on the analysis, if the IP, port, ACK and so on.
Platform: | Size: 4023296 | Author: xaiaoshqiaon | Hits:

[Windows DevelopCheetah_Injector_v1.3_By_Riot

Description: an injector for memory modification and for dll s that needs an injector. so if you need the injector here it is
Platform: | Size: 388096 | Author: ssnow19741 | Hits:

[Windows Developxfire_extenson_selfhook

Description: Call of Duty 4 cheat source code, includes some memory hacks and D3D. Works for version 1.7 Uses Xfire to inject itself
Platform: | Size: 631808 | Author: Trouble | Hits:

[Windows DevelopMEM_WRITE_READ_CLASS

Description: 内存读写类,可以用来注入用,用起来十分方便,适合初学者,呵呵!-Memory, reading and writing classes, can be used to inject use them very convenient to use, suitable for beginners, Ha ha!
Platform: | Size: 31744 | Author: xusir98 | Hits:

[Hook apiinject-code

Description: Code injection, this is a code for hooking the process memory.
Platform: | Size: 1024 | Author: marius89 | Hits:

[OS programremote-inject

Description: 远程线程注入木马c++代码。远程线程插入(注入)技术指的是通过在另一个进程中创建远程线程的方法进入目标进程的内存地址空间。将木马程序以DLL的形式实现后,需要使用插入到目标进程中的远程线程将该木马DLL插入到目标进程的地址空间,即利用该线程通过调用Windows API LoadLibrary函数来加载木马DLL,从而实现木马对系统的侵害。 -Remote thread injecting Trojan c++ code. Remote thread injection ( injection ) technology refers to the process by another method of creating distance thread into the target process of memory address space. The Trojans in the form of DLL implementation, requiring the use of inserted into the target process in remote thread the Trojan DLL inserted into the target address space of a process, namely the use of the thread by calling the Windows API LoadLibrary function to load a Trojan DLL, thereby realizing the system against trojan.
Platform: | Size: 46080 | Author: 陈嘉 | Hits:

[Game Hook Crackwai_gua_zuo_fang_zhu_ru_li_zi

Description: 外挂作坊所有的注入例程,有分层注入,钩子注入,连环注入,输入法注入,网络注入,线程注入,新进程注入,注入内存DLL对于新手提高有帮助-Plug workshops injection routine, stratified injection hook into comic injected input method injection network inject threads into the new process injection, inject memory DLL for the novice to improve
Platform: | Size: 35840 | Author: 张俊 | Hits:

[Linux-Unixhwpoison-inject

Description: Inject a hwpoison memory failure on a arbitrary pfn
Platform: | Size: 1024 | Author: riekevi | Hits:

[Software Engineeringwork

Description: 关于用中断向量表来更改系统中断,及将其注入内存中-On the use of the interrupt vector table to change the system interruption, and to inject it into memory
Platform: | Size: 70656 | Author: huangyi | Hits:

[Hook apiAPIHook

Description: 哈弗曼加密程序 哈弗曼加密程序--Plug workshops injection routine, stratified injection hook into comic injected input method injection network inject threads into the new process injection, inject memory DLL for the novice to improve
Platform: | Size: 289792 | Author: mggdx | Hits:

[Linux-Unixmemory-notifier-error-inject

Description: MODULE PARM DESC for Linux v2.13.6.
Platform: | Size: 1024 | Author: bongyonqo | Hits:

[Linux-Unixhwpoison-inject

Description: Inject a hwpoison memory failure on a arbitrary pfn.
Platform: | Size: 1024 | Author: qtcongzai | Hits:

[Game Hook Cracknczr

Description: 内存注入模块,用来注入游戏什么的都可以-Memory injection module, used to inject the game what can
Platform: | Size: 8192 | Author: 李小姐 | Hits:

[Linux-Unixmemory-notifier-error-inject

Description: Binding for dual-GPIO LED found on Network Space v2 (and parents).
Platform: | Size: 1024 | Author: nuicangcr | Hits:

[e-languageMemory-injection-DLL

Description: .子程序 标题取窗口句柄, 整数型, 公开, 根据窗口标题和类名获取窗口句柄,成功返回句柄,失败返回0或-1 .参数 窗口标题, 文本型, , 窗口标题 .参数 窗口类名, 文本型, 可空, 窗口标题 .子程序 内存注入dll, 整数型, 公开, 被注入的dll不能加强壳 必须静态编译 不能使用部分窗口组件 .参数 窗口句柄, 整数型, , 欲注入DLL的进程的窗口句柄 .参数 欲注入的字节集, 字节集, , 欲注入的DLL字节集 -. subroutine title to take the window handle, integer type, open, according to the window title and the name of the class to get the window handle successfully returns a handle failure returns 0 or- 1 Parameters window title, text type, window title . parameters of the window class name, text type, empty, window title . subprogram memory into the DLL, integer type, open, was injected into the DLL cannot strengthen the shell must be statically compiled can not use part of the window component Parameter window handle, integer type, to be injected into the process of DLL window handle The parameter to be injected into the byte set, the byte set, want to inject the DLL byte set
Platform: | Size: 8192 | Author: mochi | Hits:

[Windows DevelopBlackbone-master

Description: Process interaction Manage PEB32/PEB64 Manage process through WOW64 barrier Process Memory Allocate and free virtual memory Change memory protection Read/Write virtual memory Process modules Enumerate all (32/64 bit) modules loaded. Enumerate modules using Loader list/Section objects/PE headers methods. Get exported function address Get the main module Unlink module from loader lists Inject and eject modules (including pure IL images) Inject 64bit modules into WOW64 processes Manually map native PE images Threads
Platform: | Size: 1496064 | Author: 3ackdoor | Hits:

[Other将代码注入到进程中并运行

Description: 易语言注入进程源码例程程序调用API函数打开进程内存,将代码注入到进程中并运行。 本易语言源码例程属于易语言高级教程。(The source code routine program of the easy language injection process calls the API function to open process memory, inject the code into the process and run. This language source code routine belongs to the advanced language course.)
Platform: | Size: 5120 | Author: wzqone | Hits:

CodeBus www.codebus.net