搜索资源列表
编写感染COM文件的病毒的样例程序
- 一个感染Cmos的病毒源代码-an infection of the virus source code
感染exe文件病毒
- 感染exe文件病毒-virus infection
PE 文件的感染WIN32CPP代码
- PE 文件的感染WIN32CPP代码-PE document WIN32CPP source of infection
编写感染COM文件的病毒的样例程序
- 一个感染Cmos的病毒源代码-an infection of the virus source code
PE 文件的感染WIN32CPP代码
- PE 文件的感染WIN32CPP代码-PE document WIN32CPP source of infection
10906
- 习作大家看看.以上为病毒入口,并加上I am sorry! happy time的注释,以表明此文件已被感染过。-exercises see. Above the entrance of the virus, plus I am sorry! Happy time of the Notes to make this document has been infected with.
GAYBIN
- 关于感染型病毒行为基本原理的源代码。 1、熟悉PE结构,掌握感染过程。 -virus infection on the behavior of the basic tenets of the source code. A familiar with the structure of PE, master infection process.
RavYami12
- 与CIH一样,被“新CIH”感染的电脑,主板和硬盘数据将被破坏,致使电脑无法启动,硬盘上的数据丢失。不同的是,“新CIH”可以在Windows2000/XP系统下运行(CIH只能在Win 9X系统下运行),因此破坏范围比老CIH大得多。-CIH and the same, "CIH" infected computers, motherboards and hard disk data will be destroy
VB_EXE_virus
- VB的一个可以感染EXE的病毒原代码.没找到VB分类,先放到C#下了/-VB one can be infected with the virus EXE original code. VB classification is not found, first put under the C# /
WIN32.BolzanoWormSourceCode
- WIN32.Bolzano蠕虫源码,TASM编译,通过网络传播,感染本地共享,邮件,完整。-WIN32.Bolzano worm source code, compile processor and transmitted through the Internet. Infection local share, mail and integrity.
enumsharedresource
- 通过缓冲益溢出感染exe文件的病毒。 学习缓冲溢出和exe文件结构。 其中包含一个shellcode模版-interests through a buffer overflow infection exe file virus. Learning buffer overflow and exe file structure. Which contains a shellcode template
pander_kernel_Src
- 熊猫感染的核心代码,一份不错的开源病毒代码,仅供研究只用。有兴趣者可以自己完善它。使用本代码说产生的一切后果与本人和www.pudn.com 无关。 特别提示:请读懂代码后再运行,最好在虚拟机中运行调试。-panda infection core code, a good revenue virus code, only used for research purposes only. Interested persons c
exe-DLL
- 感染exe运行DLL 病毒技术-infection exe running DLL virus technology
QQweiba
- QQ尾巴的源代码(Delphi7编写) 该病毒会偷偷藏在用户的系统中,发作时会寻找QQ窗口,给在线上的QQ好友发送诸如“快去这看看,里面有蛮好的东西--”之类的假消息,诱惑用户点击一个网站,如果有人信以为真点击该链接的话,就会被病毒感染,然后成为毒源,继续传播-QQ tail of the source code (Delphi7 preparation) of the virus will be secretly hidden i
pe_dll_backdoor
- 通过感染exe文件运行DLL程序的代码,VC++开发的,写*的朋友可以参考下-Exe file to run through the infected DLL code, VC++ Development, writing Trojan friends can refer to the following
infect
- 感染文件程序,从98移植到XP下 单实例,自动获取API-Document procedures for infection, from 98 transplants to XP under the single-instance, automatic access to API
pemaker0
- 编译环境VC+6.0,压缩包中包含1)用来修改头部的EXE文件2)测试程序。有助于让我们了解病毒是如何感染PE文件-Compiler environment VC+ 6.0, compressed package that contains one) is used to modify the head of the EXE file 2) test procedures. Help us to understand how the v
worm
- 感染可exe文件的代码(演示),有完整的代码流程,仅供学习参考,只感染本目录的1.exe-Exe files can be infected with the code (demo), has the complete code flow, only to learn a reference catalog of infected 1.exe
首例连环感染MBR和VBR的顽固*分析
- “双枪”狙击:首例连环感染MBR和VBR的顽固*分析(word)("Guns": the first serial analysis stubborn Trojan infection of MBR and VBR)