搜索资源列表
Ber
- 一般地黑客程序会被杀毒软件当作病毒查杀,但把黑客程序用本程序修改一下就不会被查杀,需要用该黑客软件时再用本程序修改一次文件就被原封不动地还原了。-general hacker program will be as antivirus software to detect and disinfect the virus, but the hacker program using this program to change it will not be found online, the hack
网络黑客加密与破解
- 想成为真正黑客的朋友可不能错过这个不错的黑客教程哦,要不你会后悔的.-want to be a true friend of the hacker can not miss this good hackers Guide Oh, you will want to regret.
X-way2[1].5
- 黑客的工具~ 好用。用做各种扫描! 还有攻击目标 有知趣者下!-Hacker s tool, very useful,which can scan many ports and attack them.
cmd入侵批处理
- cmd入侵批处理,cmd hacker,整合hack常用dos命令.
open3389.rar
- 不用重启,开3389,控制台程序,无黑窗口,hacker必备,Do not restart, open 3389, the console program, non-black window, hacker must
China-Eagle.rar
- 中国著名的黑客联盟 中国鹰派的培训资料 对网络安全攻防的策略大全,Hacker Union of China, China' s well-known hawk on the training strategy of offensive and defensive network security Guinness
sslsniff-0.6.rar
- 这是编写sslstrip的黑客写的最新的sslsniff工具源码。,this tool is written by a hacker who writes the tool sslstrip.
HKFX201106Code
- 黑客防线2011年6月刊源码.rar 可以直接看的。-June 2011 issue of hacker defense source. Rar can see.
SpyEye_1.3.45_Loader
- SpyEye是Zeus的竞争对手,它甚至可以删除受害者电脑里的Zeus。它在地下黑客市场的零售价高达500美元。 安全公司Damballa报导,逆向工程师Xyliton破解了用VMProtect保护的SpyEye 1.3.45,发布了SpyEye 1.3.45 Loader源代码,它将允许恶意黑客开发出更复杂更难以探测的恶意程序。SpyEye作者已经发布了1.3.48,更新版本正在开发之中。-SpyEye is Zeus s competitors, it can even remov
PE_TLoader
- PE加载器很牛比的,采用pascal 语言编写,能加载任何32位PE文件!-pe laoder hacker!
BehaviorMon
- 东辉主动防御源代码1.8.7! 包含进程拦截、注册表拦截、进程强杀、文件强删等一系列高水平代码!发表在黑客防线杂志!-Donghui active defense source code 1.8.7! Contains the process block, registry interceptors, strong kill the process, file deletion and a series of strong high-level code! Line of magazine
BehaviorProMon
- 程序行为监视器,东辉编写,发表在黑客防线,可以监视进程的文件、注册表、驱动等一系列操作。-Monitor program behavior, Donghui prepared and published in hacker defense, you can monitor the process, file, registry, drivers and a series of operations.
Telnet_command
- telnet远程登陆命令和详细的操作介绍,有志于黑客的学者必读。-telnet remote login commands and detailed operational descr iption of scholars interested in the hacker must-read.
Hacking-The-Art-of-Exploitation
- 黑客之道:漏洞发觉的艺术(中文版) Hacking: The Art of Exploitation 作者:Jon Erickson-Hacker said: vulnerability found art (Chinese version) Hacking: The Art of Exploitation Author: Jon Erickson
eric-raymond-five
- Eric S. Raymond五部曲 了解黑客文化 教你如何成为一名黑客-Eric S. Raymond Five Steps to understand the hacker culture teach you how to become a hacker
thecodeofhacker
- 是一本书里的代码,书名叫小小黑客之路,介绍常用的黑客攻击手段-the code of a book named the path to a hacker,it s interesting
AntiXueTrReg
- XueTr算是目前最强的反rootkit工具了,本程序完成了对Xuetr的注册表项的隐藏,采取的方式是驱动绕过,而不是简单的GUI HACKER。-XueTr considered to be the most powerful anti-rootkit tool, the program completed Xuetr hidden registry keys, takes the form of driving around, rather than a simple GUI HACKER.
code
- 黑客X档案出版《黑客解密编程入门》随书光盘,书中代码示例-Hacker X Files published in " hackers decrypt Programming Getting Started" book with CD-ROM, book, code samples
Exe
- 流行于黑客编程Exe自杀代码,也就是自删除代码-Popular programming Exe suicide hacker code, that is, remove the code from
2011_10
- 黑客防线2011年10月刊.pdf,附件包含源代码 -Hacker defense October 2011 issue. Pdf attachment that contains the source code