搜索资源列表
SSDT
- 通过例子介绍了Windows系统服务调用的基本知识及Hook SSDT的方法-by example on the Windows system service called the basic knowledge and methods Hook SSDT
SSDT拦截例子
- SSDT拦截的好例子,大家好好研究
SSDT
- 通过例子介绍了Windows系统服务调用的基本知识及Hook SSDT的方法-by example on the Windows system service called the basic knowledge and methods Hook SSDT
SSDT
- 挂钩SSDT,通过驱动和hook函数进行进程控制。-Linked to SSDT, through the hook-driven and process control functions.
ssdt.
- Delphi开发驱动的一个例子 1.映射ntoskrnl.exe到内存 2.重定位信息... 3.搜索SSDT基址 4.补丁回去-Delphi developed an example-driven 1. Mappings ntoskrnl.exe into memory 2. ... 3, re-positioning information. Search SSDT base address 4. Patch
SSDT
- ssdt查看恢复工具源码,界面程序,具有查看和恢复ssdt功能,可以编译通过-View source ssdt recovery tools, interface procedures ssdt with the view and the restoration of function can be compiled through
SSDT
- 一个可以导出、写入SSDT表的驱动。链接名称:L"SSDT" 支持I/O操作:GET_HOOK,SET_HOOK,GET_PROC,SET_PROC-A driver which can access the SSDT table. Link Name: L"SSDT" I/O operation supported: GET_HOOK, SET_HOOK, GET_PROC, SET_PROC
SSDT-hook
- Windows内核态SSDT-hook实现进程隐藏和文件隐藏,代码很规整,学习内核编程的好例子 -a good example of studying kernel programing or driver developing, SSDT hook
anti-hook-ssdt
- ssdt钩子检测,利用查找ntkrnlpa.exe中导出的ssdt的起始地址和大小,比较实际的ssdt地址表中的内容,找出钩子-ssdt hook detection, the use of export ntkrnlpa.exe Find ssdt the start address and size, a more realistic ssdt address the contents of the table to find ou
SSDT
- delphi的驱动 功能是恢复ssdt的地址.-delphi functions is to restore the drive ssdt address.
ssdt
- 编程打造自己的SSDT恢复工具,分享一下-ssdt
SSDT
- 通过伪造SSDT表绕过360,安全卫士等杀毒软件主动防御-SSDT table to bypass 360 by forging, security guards and other anti-virus software, Active Defense
ssdt
- SSDT Table Viewr, Detecting SSDT HOoks .
anti-ssdt
- Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. Ki
SSDT
- 恢复SSDT的代码,用来干什么自己想吧 主程序在vc下编译通过,驱动用winddk编译-Restore SSDT code, for what they want to compile it by the main program in the vc, driver compiled with winddk
SSDT
- 城里城外看SSDT,ring3与ring0之间-Outside the city to see SSDT, ring3 and between ring0
ssdt-hook
- 1。获取ssdt函数个数 2。获取ssdt函数表中的所有函数 3。hook ZwQuerySystemInformation 4。unhook ZwQuerySystemInformation 5。根据用户给定的函数地址和ssdt表中的索引,修改ssdt表。-1. Get ssdt number of functions 2. Get ssdt all functions in the function table 3.
SSDT
- 详解系统服务描述符表,即SSDT。作用是把ring3的win32 api和ring0的内核api联系起来-Detailed system service descr iptor table, the SSDT. Role is to the win32 api and ring0 ring3 kernel api link
SSDT
- 建立新的SSDT表,修改可以绕过,某些游戏保护系统的SSDT HOOK 或 INLINE HOOK-SSDT table to create a new, modified to bypass certain game protection system SSDT HOOK or INLINE HOOK
自己的“SSDT”绕过主动防御
- “SSDT”绕过主动防御绕过360主动防御金山主动防御("SSDT" bypass active defense, bypass 360 active defense, Jinshan active defense)