Welcome![Sign In][Sign Up]
Location:
Search - ssdt

Search list

[Windows KernelSSDT拦截例子

Description: SSDT拦截的好例子,大家好好研究
Platform: | Size: 75694 | Author: bolong | Hits:

[Hook apiSSDT

Description: 通过例子介绍了Windows系统服务调用的基本知识及Hook SSDT的方法-by example on the Windows system service called the basic knowledge and methods Hook SSDT
Platform: | Size: 1024 | Author: zhangyoufu | Hits:

[Hook apiSSDT

Description: 挂钩SSDT,通过驱动和hook函数进行进程控制。-Linked to SSDT, through the hook-driven and process control functions.
Platform: | Size: 36864 | Author: yeqing | Hits:

[Driver Developssdt.

Description: Delphi开发驱动的一个例子 1.映射ntoskrnl.exe到内存 2.重定位信息... 3.搜索SSDT基址 4.补丁回去-Delphi developed an example-driven 1. Mappings ntoskrnl.exe into memory 2. ... 3, re-positioning information. Search SSDT base address 4. Patch back
Platform: | Size: 14336 | Author: fanghui | Hits:

[Windows DevelopSSDT

Description: ssdt查看恢复工具源码,界面程序,具有查看和恢复ssdt功能,可以编译通过-View source ssdt recovery tools, interface procedures ssdt with the view and the restoration of function can be compiled through
Platform: | Size: 139264 | Author: 黄光 | Hits:

[Windows DevelopSSDT

Description: 一个可以导出、写入SSDT表的驱动。链接名称:L"SSDT" 支持I/O操作:GET_HOOK,SET_HOOK,GET_PROC,SET_PROC-A driver which can access the SSDT table. Link Name: L"SSDT" I/O operation supported: GET_HOOK, SET_HOOK, GET_PROC, SET_PROC
Platform: | Size: 38912 | Author: William Lee | Hits:

[Hook apiSSDT-hook

Description: Windows内核态SSDT-hook实现进程隐藏和文件隐藏,代码很规整,学习内核编程的好例子 -a good example of studying kernel programing or driver developing, SSDT hook
Platform: | Size: 5120 | Author: goodone | Hits:

[Hook apianti-hook-ssdt

Description: ssdt钩子检测,利用查找ntkrnlpa.exe中导出的ssdt的起始地址和大小,比较实际的ssdt地址表中的内容,找出钩子-ssdt hook detection, the use of export ntkrnlpa.exe Find ssdt the start address and size, a more realistic ssdt address the contents of the table to find out hook
Platform: | Size: 6144 | Author: john smith | Hits:

[Driver DevelopSSDT

Description: delphi的驱动 功能是恢复ssdt的地址.-delphi functions is to restore the drive ssdt address.
Platform: | Size: 63488 | Author: 马大仙 | Hits:

[Internet-Networkssdt

Description: 编程打造自己的SSDT恢复工具,分享一下-ssdt
Platform: | Size: 116736 | Author: 天天向上 | Hits:

[Driver DevelopSSDT

Description: 通过伪造SSDT表绕过360,安全卫士等杀毒软件主动防御-SSDT table to bypass 360 by forging, security guards and other anti-virus software, Active Defense
Platform: | Size: 5120 | Author: 吴志强 | Hits:

[Hook apissdt

Description: SSDT Table Viewr, Detecting SSDT HOoks .
Platform: | Size: 14336 | Author: __Genius__ | Hits:

[Hook apianti-ssdt

Description: Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle is to find the function by address jump. So long as the original forged an SSDT, you can make SSDT-HOOK invalid.
Platform: | Size: 5120 | Author: 何耀彬 | Hits:

[OS programSSDT

Description: 恢复SSDT的代码,用来干什么自己想吧 主程序在vc下编译通过,驱动用winddk编译-Restore SSDT code, for what they want to compile it by the main program in the vc, driver compiled with winddk
Platform: | Size: 17408 | Author: yuhang | Hits:

[VC/MFCSSDT

Description: 这是描述Windows内核的学习资料。讲解SSDT的原理以及使用方法。-This is the description of Windows kernel learning materials. SSDT explain the principle and use it.
Platform: | Size: 152576 | Author: | Hits:

[Windows DevelopSSDT

Description: 城里城外看SSDT,ring3与ring0之间-Outside the city to see SSDT, ring3 and between ring0
Platform: | Size: 32768 | Author: 黄明发 | Hits:

[Hook apissdt-hook

Description: 1。获取ssdt函数个数 2。获取ssdt函数表中的所有函数 3。hook ZwQuerySystemInformation 4。unhook ZwQuerySystemInformation 5。根据用户给定的函数地址和ssdt表中的索引,修改ssdt表。-1. Get ssdt number of functions 2. Get ssdt all functions in the function table 3. hook ZwQuerySystemInformation 4. unhook ZwQuerySystemInformation 5. Given function according to the user address and ssdt table index, modify ssdt table.
Platform: | Size: 10240 | Author: wu | Hits:

[Hook apiSSDT

Description: 详解系统服务描述符表,即SSDT。作用是把ring3的win32 api和ring0的内核api联系起来-Detailed system service descriptor table, the SSDT. Role is to the win32 api and ring0 ring3 kernel api link
Platform: | Size: 36864 | Author: 杨阳 | Hits:

[Hook apiSSDT

Description: 建立新的SSDT表,修改可以绕过,某些游戏保护系统的SSDT HOOK 或 INLINE HOOK-SSDT table to create a new, modified to bypass certain game protection system SSDT HOOK or INLINE HOOK
Platform: | Size: 21504 | Author: f74108 | Hits:

[Anti-virus自己的“SSDT”绕过主动防御

Description: “SSDT”绕过主动防御绕过360主动防御金山主动防御("SSDT" bypass active defense, bypass 360 active defense, Jinshan active defense)
Platform: | Size: 18432 | Author: IDking | Hits:
« 12 3 4 5 6 7 8 9 10 ... 17 »

CodeBus www.codebus.net