Location:
Search - trojan
Search list
Description: 一个VB写的国外木马的源代码the_dark_age.zip-write a VB foreign Trojan source code the_dark_age.zip
Platform: |
Size: 113664 |
Author: waterwhu |
Hits:
Description: vc++著名的木马程序BO2000源代码-vc famous Trojan source code BO2
Platform: |
Size: 601088 |
Author: 震宇 |
Hits:
Description: 木马YAI的源代码-Trojan source code
Platform: |
Size: 322560 |
Author: 姜涛 |
Hits:
Description: 简单的木马源程序。-simple Trojan source.
Platform: |
Size: 6144 |
Author: sz |
Hits:
Description: 一个自己编写的木马程序,包括服务端和客户端.服务端把自己注册成为服务,并且使用了类似MFC的查表命令解释机制.-prepared by a Trojan own procedures, including server and the client. Server themselves registered as a service, and the use of a similar order MFC Lookup explain the mechanism.
Platform: |
Size: 932864 |
Author: 梁我我 |
Hits:
Description: 著名的木马密码结巴的源代码。可是盗号码的经典了。是密码就能盗的。-famous Trojan Password articulation of the source code. However, the number of bootlegging a classic. Is the password can be stolen.
Platform: |
Size: 714752 |
Author: hong |
Hits:
Description: 反弹型木马原理分析,对于一个想成为Hacker的人来说,------好书!-rebound Trojan Principle, to become a Hacker who ,------ books!
Platform: |
Size: 39936 |
Author: 王耀 |
Hits:
Description: 一个经典的木马源程序,感兴趣的朋友可以下来看看。-It is a classical source code of a remote trojan, you can download it and have a try if you have interest in trojan.
Platform: |
Size: 59392 |
Author: 特务 |
Hits:
Description: 浅析木马服务端的生成技术,视频局部区域,
扩展表格控件-services of Trojan-generation technology, video local area, the expansion of form controls, etc.
Platform: |
Size: 993280 |
Author: tom |
Hits:
Description: 全面教你编写木马,使你也成为木马高手让,能编出高质量的木马程序,也可以让你更加了解木马病毒,防范木马病毒-fully prepared Trojan teach you, so you become so expert Trojans can produce a quality Trojan program, but also allows you to better understand Trojan guard against Trojan
Platform: |
Size: 37888 |
Author: 冷风 |
Hits:
Description: 木马代码 NameLess BackDoor V1.14(稳定版)源代码 , 十分珍贵的东西,强烈建议下载. 感谢作者的开源-Trojan code NameLess BackDoor V1.14 (stable version) source code, a very precious things, it is strongly recommended to download. Thanks to the open-source authors
Platform: |
Size: 112640 |
Author: 吴承英 |
Hits:
Description: VC++动态链接库编程之DLL木马源代码-VC dynamic link library DLL programming Trojan source code
Platform: |
Size: 9216 |
Author: 张磊 |
Hits:
Description: 木馬自動旋轉,以及一些VB+opengl得用法-Trojan automatic rotation, and some in opengl VB usage, etc.
Platform: |
Size: 7168 |
Author: 林晉偉 |
Hits:
Description: 木马彩衣,delphi版本的,可以用来伪装木马-Trojan coat, delphi version can be used to camouflage Trojan
Platform: |
Size: 211968 |
Author: 金属 |
Hits:
Description: 很经典的后门木马,功能就不用多说了吧,WOLF9-classic backdoor Trojan, functions on the fact the bar, WOLF9
Platform: |
Size: 380928 |
Author: 金属 |
Hits:
Description: 支持多线程的木马程序,支持聊天,一个文件客户端和服务器端,有键盘监控,支持文件传输-multithreading support the Trojan program, support chat, a file server and the client side, the keyboard control, support for file transfer
Platform: |
Size: 3049472 |
Author: bill |
Hits:
Description: 一套模拟特洛伊木马的程序,分为客户端和服务器端。-a Trojan simulation procedure is divided into client and server.
Platform: |
Size: 23552 |
Author: 任福新 |
Hits:
Description: 一个用VB开发的木马程序,服务器端与客户端!-a VB development of the Trojan program, the server-client!
Platform: |
Size: 39936 |
Author: wzx |
Hits:
Description: Linux Kernel Exploit研究和探索,溢出植入型木马(后门)的原型实现,HP-UX溢出程序编写,DDOS攻防与追踪技术,内核后门实现及其检测,浅析反病毒引擎,Linux端口复用技术简述,应用SMB/CIFS协议,SocksCap的简单实现,FreeBSD私有文件系统的制作,智能化安全策略探索--对于网络扫描防御的实现,计算机病毒特征码提取分析-Linux Kernel Exploit study and exploration, overflow into Trojan (back door) Prototype Implementation, HP-UX overflow programming, DDOS defense and tracking technology, and achieve kernel backdoor detection of anti-virus engine, the Linux port Reuse briefly application SMB/CIFS agreement SocksCap the simple realization, FreeBSD private document production system, intelligent security strategy-- defense network scanning the realization Computer Virus Scan Extraction
Platform: |
Size: 505856 |
Author: hulipeng |
Hits:
Description: Many users have got used that Windows NT Task Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, process hiding is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amazes me that there are only a few trojans using these methods. Literally only 1 trojan from a 1000 is hidden. I think that trojan authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made sources and copy-paste them. Therefore we should expect hidden trojan processes in a near future.-Many users have got used that Windows NT Tas k Manager shows all processes, and many consider that i s impossible to hide a process from Task Manager. Actually, hiding process is incredibly simple. There are lots of methods available for such a purpose and there are source codes available. It still amaz es me that there are only a few trojans using thes e methods. Literally only a variant is from a 1000 hidden. I think that disables authors are lazy, since it requires extra work to hide the process and it is always easier to use ready-made source s and copy-paste them. Therefore we should Expe ct hidden variant processes in a near future.
Platform: |
Size: 15360 |
Author: inwing |
Hits:
«
1
23
4
5
6
7
8
9
10
...
50
»