搜索资源列表
malware
- 恶意代码机理与防范技术研究,一篇非常好的博士毕业论文,对于恶意代码讲解全面而有深度,对于恶意代码研究很有帮助,.nh格式,使用CAJViewer打开-Mechanism and prevention of malicious code technology research, a very good Ph.D. thesis, for malicious code on a comprehensive and deep, very he
malware
- 武汉大学恶意代码课程资料 (全国最好的信息安全专业课程)
ESCAN
- ESCAN源代码 ESCAN是一个完全设计和研发来保护个人计算机免于各类威胁(像是病毒、间谍软件、广告软件、恶意软件、按键记录程序、黑客程序、垃圾邮件软件、隐私权问题、令人厌恶的内容..等等)的专业软件-Escan Escan source code is a completely designed and developed to protect personal computers from all types of threa
Malware
- 计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
ASProxy
- spy proxy is an agent based detection of malicious web content it protect the users from internet borne malware
ameagle
- These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and al
5_Malware_Analysis_Detection
- A Book About Malware
Malware
- 恶意程序源代码,让c_time 崩溃,使系统无限注销,仅用于学习-A malware sourcecode,only for study
200761112104291
- 根据tommsoft提供的恶意软件清理工具提供的开发包,汉化整理而成,由于上次失误,没有发源代码,特重新发出! -According to tommsoft malware provided by the development of clean-up tool bag, finished order made that since the previous errors, there is no origin code, specia
scan_malware_tool_2.0
- search file list and view malware database
20104141531383
- 流氓软件扫面与清除源码 运行平台: Windows -Malware scanning and removal source operating platforms: Windows
007
- 随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、*、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Ho
MyKill
- 自己写得*转移程序。自动查找Malware.QVM14.GEN*,并把它转移到E:\bak目录下。-Trojan shift their written procedures. Automatically find Malware.QVM14.GEN Trojans, and to transfer it to E: \ bak directory.
anatomy-of-stealth-malware
- Anatomy of Stealt Malware, very good
Dissecting-Android-Malware
- A FILE DECRIBING ANDROID DESERTING MALWARE PDF VERSION
malware-links-parser
- Malware links parser
malware-links-parser
- Malware links parser
Malware-Armor-Blackhat-Presentation-2015_08_15.zi
- Malware Armor Blackhat Presentation 2015_08_15
Chapter 0-1
- Malware Analysis book is a guide to do reverse engineering malware
Chapter 2-3
- Malware Analysis book is a guide to do reverse engineering malware 2