Welcome![Sign In][Sign Up]
Location:
Search - trojan

Search list

[VC/MFCTrojan-killing-depth-profiling

Description: 疱丁解马-木马查杀深度剖析,从基础一点一滴讲起关于木马的内容,适用新人-Small blister solutions horses- Trojan killing depth profiling
Platform: | Size: 1883136 | Author: 张浩杰 | Hits:

[OtherSimple-Trojan

Description: 基于tcp/ip 的简单远控木马 学习远控的可以拿这个人人门!-Based on the simple remote control of tcp/ip Trojan
Platform: | Size: 46080 | Author: 悍勇 | Hits:

[Software Engineeringtrojan

Description: 有关木马或病毒的小知识等等,你可以学到有关的小技巧-Trojan or virus little knowledge, you can learn about tips, etc.
Platform: | Size: 2048 | Author: shiliang | Hits:

[VC/MFCVisualPC-trojan-source

Description: Visual+C黑客编程揭秘与防范源代码,实现反弹木马的全部功能,调试通过-Visual+C hacker programming Secret prevent source code, to achieve full functionality of the Trojan debugging through
Platform: | Size: 16075776 | Author: cf | Hits:

[JSP/JavaTrojan.JS.Scob.a-source

Description: 为JS.SCob木马下载器的源代码是可用的。通过检查JS.SCob的源代码,你可以看到有恶意的JavaScript下载的恶意程序使用一种无形的IFRAME以妥协的制度。此外,它如何使用微软的IIS的命令送达给客户端的浏览器,而无需实际修改文件的IIS服务器位于页脚特色。如何使用一个隐藏的Cookie定期尝试连接到远程站点,其中包含的恶意软件。-The source code for the JS.SCob Trojan downloader is available. By inspecting the source code of JS.SCob you can see how the malicious JavaScript downloads the malicious program using an invisible IFRAME in order to compromise a system. In addition, how it uses the footer featured of Microsoft s IIS in order to be served to client browsers without actually modifying any files located in the IIS server. And how it uses a hidden cookie to periodically attempt connection to the remote site that contains the malware.
Platform: | Size: 5120 | Author: 潘海青 | Hits:

[Remote ControlNemesis-Trojan-Cli-src

Description: Remote Desktop trojan.NEMESIS.Program to manage remotely comps.
Platform: | Size: 28672 | Author: Pera Zdera | Hits:

[Remote ControlNemesis-Trojan-Console-src

Description: Nemesis Trojan Console Source.Server for Nemesis Trojan client.
Platform: | Size: 19456 | Author: Pera Zdera | Hits:

[OtherTrojan-lab-report

Description: 具体的木马攻击演示实例及具体过程,里面是实验报告。-The specific Trojan attack demo, which is the lab report.
Platform: | Size: 595968 | Author: li weixia | Hits:

[Software EngineeringICMP-based-Trojan

Description: 基于ICMP的木马攻击技术和防范策略探讨-Discuss on ICMP-based Trojan attack technology and prevention strategies
Platform: | Size: 211968 | Author: 张成武 | Hits:

[source in ebookSecret-Trojan-technology-

Description: 木马技术揭秘和防御的源码,对了解木马技术很有帮助-Secret Trojan technology and defense source code, very helpful for understanding the Trojan technology
Platform: | Size: 39936 | Author: 李正峰 | Hits:

[Shell apiTrojan-secret-and-defense-source

Description: 木马揭秘与防御的源代码,可以供借鉴,VC6.0-Trojan secret and defense source
Platform: | Size: 41984 | Author: 郑袤 | Hits:

[Internet-NetworkCommand-Backtrack-setting-IP-P-Trojan

Description: comand backtrack and making trojan
Platform: | Size: 1024 | Author: killua4 | Hits:

[OtherTrojan-Principle

Description: 木马的 实现原理 分类和 实例分析-Principle _ Trojan classification and case analysis
Platform: | Size: 60416 | Author: 任晓成 | Hits:

[WEB CodeTrojan

Description: 该木马可在服务器上增加 文件,体积小巧。-The Trojan can add files on the server, compact.
Platform: | Size: 1024 | Author: sun | Hits:

[CommunicationSimple-Trojan

Description: 基于TCP的简单木马,取对方系统信息,将对方鼠标左右对调等-Simple TCP-based Trojan, take the other system information, such as the mouse around each swap
Platform: | Size: 3134464 | Author: 李文达 | Hits:

[CSharpremotecontrol-of-Trojan

Description: 必备基本功能的木马源代码级说明,包含远控和自动隐藏-Trojan source code level description of the essential basic functions, including remote control and auto-hide
Platform: | Size: 49152 | Author: nikolas | Hits:

[Web ServerAll-kinds-of-Trojan

Description: 各种木马特征,本文件用来查询木马特征,列出了绝大多数木马特征点-All kinds of Trojan characteristics, this file is used to query the characteristics of the Trojan horse, listed the vast majority of Trojan feature points
Platform: | Size: 1024 | Author: 尹某某 | Hits:

[CSharpsimple-trojan-experiment

Description: 大三做的一次简单木马实验。客户端通过端口号与服务器连接,达到简单控制服务器的目的。包括修改注册表,添加新用户,关闭防火墙,QQ,计算机等操作。-a simple trojan experiment in junior. The client connect with the server to achieve the purpose of simply control the server. The operation includes updating the registry,adding new users,closing the firewall ,qq,and the computer and so on.
Platform: | Size: 176128 | Author: | Hits:

[Anti-virusTrojan-virus

Description: 用C语言编写木马病毒,简短易学,是密码学入门的好程序-Written in C language a Trojan virus, brief yi-ology, is a good program introduction to cryptography
Platform: | Size: 1024 | Author: jiji | Hits:

[OtherTrojan-virus-source-code

Description: this is c++ code for trojan horse code virus
Platform: | Size: 1024 | Author: yogesh | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »

CodeBus www.codebus.net