搜索资源列表
cmdbind2
- 让进程在系统中更加隐蔽(2) 一般来说一个后门程序需要更改系统的某些文件来让程序在系统启动执行这个程序, 又要在某个地方保留这个程序(一般是在硬盘)。如果有什么办法不这样做又让程序在 系统中运行的话,就可以使后门程序更加隐蔽。也就是说程序在硬盘上找不到在系统的 启动配置中没有这有项。真正要做到这样好象不太现实,但可以采用简单的方法:在程 序被执行后删除程序文件和启动文件中被更改的部分,然后在系统被关闭前保留程序文 件和更改启动文件,让它在系统启动时又能被执行。 程序是一个可执行文件在被执行时系统
pevirus
- 线程插入后门带传染功能-threaded insert infected with backdoor function
Windows2000-XP服务级后门程序(源码)
- Windows2000-XP服务级后门远程控制程序源码-Windows-XP service-level backdoor remote control procedures FOSS
PhpShell
- phpshell,就是php的后门和命令行.很好用.-phpshell, is the backdoor php and the command line. Very good use.
后门程序
- 后门程序正反向连接获得SHELL用Release编译方式.DEBUG版本的程序大小是Release版本的几倍,都是些没用的调试信息-pros and backdoor access to connect with Release compiler SHELL way. DEBUG size versions of the program is the Release version of times that are more useless information for debugging
backdoor
- 我自己编的一个网络软件后门程序,可以在后门控制台控制软件,在网络游戏中可以作弊等。-I make up a network of backdoor software, can be in the back door console control software, in the network game can cheat, etc.
backdoor
- 用C实现的反向连接后门代码。具有反向连接功能,服务器端通过域名解析向客户端发起建立连接请求。-Implemented in C code reverse connection back door. Connection with the reverse function, through the DNS server to the client initiates a connection request.
backdoor-virus
- 后门病毒源代码,用C语言编写,后门病毒源代码,用C语言编写。-Backdoor virus source code, written in C, backdoor virus source code, using C language.
backdoor-virus-code
- 一些后门病毒代码........包括多种经典病毒源码-Some backdoor virus code ........ including a variety of classic virus source
AdminChick-BackDoor
- AdminChick-BackDoor.zip 远程管理软件源码。 一种系统后门程序、命令控制管理、仅供学习研究、请下载后24小时内删除、若构成任何法律责任一切责任与提供者无关-AdminChick-BackDoor.zip remote management software source code. A backdoor program, command and control management system, study and research purposes only, plea
backdoor
- c语言后门源码(转), 希望对爱好hack的人有帮助-it s backdoor code
backdoor
- backdoor 病毒源代码,可以用来学习下。-backdoor virus source code, can be used to study under.
simple-reverse-backdoor-the-code-
- 一个简单的反向后门代码列子,对于初学网络编程的朋友可能会有些帮助.-A simple reverse backdoor the code Liezi for the beginner of network programming of friends may be helpful.
unix-backdoor--traces-hidden
- unix后门与踪迹隐藏,这是搞渗透测试的基本文章,分享一下.-unix backdoor, traces hidden, which is to carry out penetration testing, and share.
Registry-Backdoor
- 它插入Explorer.exe服务启动,并且恢复sst过主动拦截防御。 使用了内核驱动程序,bindshell后门功能,以及下载者功能。 -Insert it into the Explorer.exe service starts, and restored sst active interceptor defense. Using the kernel driver, bindshell backdoor functionality, as well as those who downl
Registry-Backdoor
- 内核级后门代码.它插入Explorer.exe服务启动,并且恢复sst过主动拦截防御。使用了内核驱动程序,bindshell后门功能,以及下载者功能。-Kernel-level backdoor code it into the Explorer.exe service starts, and restore their own initiative to intercept sst defense. Using a kernel driver, bindshell backdoor funct
backdoor
- 自己写的第一个后门,就是返回CMDSHE-the first backdoor
High-imitation-shift-backdoor-source
- 高仿shift后门程序源码,运行后可以利用这个编写后的工具添加账户,超级仿真后门-High imitation shift backdoor source code, running can use this tool to add after the preparation of the accounts, super simulation backdoor
NGINX BACKDOOR
- nginx backdoor bkdoor
windows-backdoor
- 一个简单的网络Windows后门程序 仅供参考,不要用做他图 -one simple backdoor example