Location:
Search - process hacker
Search list
Description: 代码包括了进程监视和键盘记录两方面的功能,是一款不错的黑客程序。-code including the process of monitoring and keylogging the two functions, is a true hacker program.
Platform: |
Size: 195130 |
Author: 特务 |
Hits:
Description: Hacker Defender 1.0.0
内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。该后门技术允许植入Redirector。鉴于参数过多,不推荐新手使用。-Hacker Defender 1.0.0 kernel-level backdoor software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys keys, open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive. The backdoor allows implantation Redirector. Given the parameters too much, do not recommend the use of newcomers.
Platform: |
Size: 92628 |
Author: 苹果 |
Hits:
Description: 一个Hacker程序,它实现的原理是服务器端获得机器上的文件、密码、桌面图像后,根据事先设定的电子邮件地址将这些内容通过电子邮件发送到客户端。不过斑竹认为利用VB做Hacker程序限制比较多,这个程序可以作为一个远程管理的程序来研究。-a Hacker procedures, it implements the principle of access to server files on the machine, password, desktop images, according to a pre-set e-mail addresses these elements by e-mail sent to the client. But fed - that the use of VB Hacker procedural restrictions do more, the process can be used as a remote management procedures to study.
Platform: |
Size: 72961 |
Author: 刹那 |
Hits:
Description: 这是一个写PE文件病毒的教程,里面有详细的过程,以及函数,是一个高级黑客必备的技能,从现在开始你也就能掌握了-This is a written document PE virus Guide, which detailed the process and function, Hacker is a senior essential skills, from now on you will be able to grasp the
Platform: |
Size: 3480 |
Author: 于军亮 |
Hits:
Description: 几个hacker程序源码简介: 1*远程主机的磁盘目录与文件的浏览,上、下载,远程执行等。2*提供三种方式的连接方式:*Udp单包快速交互目录浏览,*Udp包入反向TCP连接,*常规的TCP主动连接。3*屏幕查看单屏或连续监控,图象质量自定义(1-100),同时可鼠标与键盘遥控。4*提供简易搜索,进程管理:IP地址与端口的区间与组合扫描分析等,可查看远程主机的运行进程,并任意终止它.5*代理控制服务框架:程序结构可以构造100多台计算机构成多节点代理,接力传递目标计算机的信息包,最后传到主控制端,框架搭好,有兴趣者可索要源代码代码实现之。(服务端运行后要连续双击几个文本文件后可能驻留内存,隐藏到系统内,以后的文本关联都可以打开服务端文件。) -several hacker procedures source description : a remote host* disk directory and file browser, and download, remote execution. 2* provide three forms of connectivity :* Udp single packet rapid interactive catalog browsing, Udp* TCP packets into reverse connect* Conventional TCP active connector. 3* Screen View-screen or continuous monitoring, since the definition of image quality (1-100), while mouse and keyboard control. 4* Easy search and process management : IP address and port combination with the range of scanning, can be found on the remote host running process, and arbitrary termination of its .5* Deputy control services framework : program structure can be constructed more than 100 computers and multi-node agents, relay the goal of computer transmission of information packe
Platform: |
Size: 389120 |
Author: zzy |
Hits:
Description: Hacker Defender 1.0.0
内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。该后门技术允许植入Redirector。鉴于参数过多,不推荐新手使用。-Hacker Defender 1.0.0 kernel-level backdoor software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys keys, open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive. The backdoor allows implantation Redirector. Given the parameters too much, do not recommend the use of newcomers.
Platform: |
Size: 92160 |
Author: 苹果 |
Hits:
Description: 内核级后门软件,用户可以通过本软件隐藏文件、进程、系统服务、系统驱动、注册表键的键和键值、打开的端口以及虚构可用磁盘空间。程序同时也在内存中伪装它所做的改动,并且隐身地控制被隐藏进程。程序安装隐藏后门,注册隐藏系统服务并且安装系统驱动。-backdoor kernel-level software, users of the software can be hidden files, processes, systems and services, the system drive, registry keys and the keys keys, open ports and fictitious available disk space. Programs are also memory camouflage it changes made to the stealth and hidden control process. Installation hidden back door, registered hidden and system services to install the system drive.
Platform: |
Size: 92160 |
Author: 袁 |
Hits:
Description: 一个Hacker程序,它实现的原理是服务器端获得机器上的文件、密码、桌面图像后,根据事先设定的电子邮件地址将这些内容通过电子邮件发送到客户端。不过斑竹认为利用VB做Hacker程序限制比较多,这个程序可以作为一个远程管理的程序来研究。-a Hacker procedures, it implements the principle of access to server files on the machine, password, desktop images, according to a pre-set e-mail addresses these elements by e-mail sent to the client. But fed- that the use of VB Hacker procedural restrictions do more, the process can be used as a remote management procedures to study.
Platform: |
Size: 72704 |
Author: 刹那 |
Hits:
Description: 《黑客调试技术揭密》是帮助应用程序员和系统程序员理解调试过程的指南,揭示了各种调试器的实用使用技巧,说明了如何操作调试器以及如何克服障碍和修复调试器,介绍了黑客利用调试器和反汇编器来寻找程序弱点和实施攻击的方法-"hackers debugging techniques to conduct" is to help application programmers and systems programmers understand the debugging process guide reveal the various Debugger practical use of skills explains how to operate the debugger and how to overcome obstacles and repair Debugger, Hackers use of the debugger and anti-assembler to find weaknesses in procedures and methods of attack
Platform: |
Size: 14988288 |
Author: 赵 |
Hits:
Description: 一个可以检查HotMail邮件的程序,你可以使用改程序检查你的Hotmail账户是否有邮件而不用登陆到www.hotmail.com上了-HotMail mail a check procedure, you can use to process your Hotmail account to check whether there are e-mail instead of landing on the www.hotmail.com
Platform: |
Size: 57344 |
Author: 龙霄 |
Hits:
Description: Process Hacker is a free and open source process viewer and memory editor with unique features such as a Regex memory searcher and a powerful run-as tool. It can show services, processes and their threads, modules, handles and memory regions.
Platform: |
Size: 1487872 |
Author: YH7TZwEeT7Eb |
Hits:
Description: 这个工具完全是模仿< 深入理解windows系统 4th Edith>>的作者Mark写的Process explore(进程浏览器)写的,论坛里有1.3.6版本的,1.x版本是用CSHARP实现的,我研究过,从中学里很多东西。最近发现,作者发布了一个2.1版本的代码,是用C写的,太酷了,这对于想深入了解windows系统机制的人是一个必须看的源码,而且该源码涉及windows进程的各个方面,很多功能可以直接拿来使用。研究这个代码,一定要看看<<深入理解windows系统 4th Edith>>。-Why should I use Process Hacker? Why not Process Explorer or some other program?
Process Hacker offers some pretty unique features, like an awesome run-as tool and the ability to find and terminate hidden processes. The intended users are developers and people interested in Windows internals. This tool is NOT intended for general system optimization- if you want to do that, Process Explorer is for you.
"Process Hacker"? Is this a dangerous "hacking" tool?
Please read about the correct definition of "hacker".
Why is there annoying bug X in Process Hacker? Why is Process Hacker missing feature Y?
Please report any bugs or suggestions to our tracker. Feel free to upload patches.
Is Process Hacker a portable application?
Yes. If you want settings to be saved on your USB drive, start Process Hacker like this: ProcessHacker.exe-settings settingsfile
Symbols don t work properly!
Firstly, you need the latest dbghelp.dll version. Install Debugging Tools for Windows, open Proce
Platform: |
Size: 2051072 |
Author: lijun |
Hits:
Description: 支持炫舞后台喊话 QQ喊话
可以提取进程来进行任意游戏喊话!-Support QQ propaganda propaganda Hyun dance background process can be extracted for any game propaganda!
Platform: |
Size: 100352 |
Author: 林枫 |
Hits:
Description: 进程管理软件,可代替Windows资源管理器,实现进程的管理控制-process control
Platform: |
Size: 7687168 |
Author: zhangfeng |
Hits:
Description: 进程查看工具,用于查看和操作流程。
其最基本的功能包括:
*查看,终止,暂停和恢复进程
*重新启动进程,创建转储文件,分离从
任何调试,查看堆,注入的DLL等。
*查看详细过程的信息,统计,和
性能信息
*查看,终止,挂起和恢复线程
*查看详细令牌包括修改的信息(
权限)
*查看和卸载模块
*查看内存区域
*查看环境变量
*查看和关闭处理
*查看,控制和编辑服务
*查看和关闭网络连接-Process Hacker is a tool for viewing and manipulating processes.
Its most basic functionality includes:
* Viewing, terminating, suspending and resuming processes
* Restarting processes, creating dump files, detaching from
any debuggers, viewing heaps, injecting DLLs, etc.
* Viewing detailed process information, statistics, and
performance information
* Viewing, terminating, suspending and resuming threads
* Viewing detailed token information (including modifying
privileges)
* Viewing and unloading modules
* Viewing memory regions
* Viewing environment variables
* Viewing and closing handles
* Viewing, controlling and editing services
* Viewing and closing network connections
Platform: |
Size: 7748608 |
Author: 先后 |
Hits:
Description: Process Hacker s Src is Gnu Application.
Platform: |
Size: 2353152 |
Author: James King |
Hits:
Description: Process Hacker SDK is platform for Develop Good Software.
Platform: |
Size: 2370560 |
Author: James King |
Hits:
Description: Process Hacker 2.25 Source Code
Platform: |
Size: 2397184 |
Author: weird |
Hits:
Description: 黑客必学_最全面的菜鸟到高手的过程,多了解黑客的知识,才能更好防护-Hackers will learn _ the most comprehensive rookie to master the process, the more knowledge of the hacker in order to better protect
Platform: |
Size: 56320 |
Author: LI |
Hits:
Description: 《黑客编程基础》包括木马、恶意程序、病毒、缓冲区溢出攻击、dos攻击过程的源码分析和黑客编程实例。- Hacker Programming Fundamentals includes Trojans, malware, virus, buffer overflow attacks, dos source code analysis of the process and hacker attacks programming examples.
Platform: |
Size: 10432512 |
Author: |
Hits: