搜索资源列表
PRIORITY
- 完整的特洛伊木马 PRIORITY 源代码-PRIORITY Trojans complete source code
vc60
- 解读代码,解压文件,排除木马,编辑程序,防止病毒入侵-Interpretation of the code, unzip the file and remove Trojans, editing procedures to prevent viruses
muma
- 木马程序的源代码,这么木马程序的用途很多,自己看看学习一下-Trojan program' s source code, so use a lot of Trojans, see for yourself to learn about
Vc-code
- 反弹性远程控制木马VC源代码,从别的地方拷贝过来的。很好用-Remote Control Trojans rebound VC source code, copied from somewhere else overnight. Good use
CMDSHELL3
- cmd管道实现的简单后门程序,可以修改为木马程序。-cmd pipe to achieve a simple backdoor, you can modify for the Trojans.
Android_FakeToken.A_infected
- 一款android上木马程序的源码及分析文档。-Source code and analysis of documents of the Trojans on android
ftphobbyhorse
- 另一个可以在你的计算机上开FTP服务器的木马源代码-Another computer on your FTP server Trojans open source code
simplehobbyhorse
- 一个简单的木马程式-A simple Trojans
winsockhobbyhorse
- 用winsock简单的木马程序-Simple to use winsock Trojans
verygoodhobbyhorse
- 优秀的木马程序,自己看吧-Excellent Trojans, and see their own
hack
- vb写的木马程序-vb wrote Trojans
LkmRootkit
- 后门木马程序的核心文件原文 大家可以看一下-Backdoor Trojans core document we can look at the original
asp_MUMA
- 网上收集的,asp木马程序。用于学习之用。-Online collection, asp Trojans. For learning purposes.
client
- VB 远程木马,反向连接,主控端可以生成有配置信息的服务端,可以执行DOS命令-VB remote Trojans, reverse connection, the host can generate are the server configuration information, you can run DOS commands
trojan_analysis
- 疱丁解马-木马查杀深度剖析,帮助深受木马毒害的朋友们了解木马是什么,又如何查杀-Cronartium Ding Xie Ma- Trojan killing depth analysis to help the Trojans poisoned by friends who understand what is the Trojan horse, how killing
tiantang2muma
- 天堂二的木马,学的还可以,可以借鉴,不要做坏事哟-Paradise II Trojans, can also learn, we can draw on, not to do bad things yo
HOOKWestwardJourneyIITrojans
- HOOK大话西游II木马编写,详尽地技术说明,是木马编写研究的经典参考!-HOOK Westward Journey II Trojans prepare detailed technical notes, Trojan horses are a classic reference to the preparation of the study!
jincheng
- vb版的枚举隐藏进程,隐藏木马、病毒无处藏身-vb version of the enumeration hidden processes, hidden Trojans, viruses have no place to hide
Ice_Trojan_experimental_invasion_and_protection.ra
- 冰河木马入侵和防护实验。通过使用 IPC$ 漏洞扫描器发现网络中有安全漏洞的主机,植入木马程序,控制远程主机,然后在客户端查杀木马,进行防护。-Ice Trojan experimental invasion and protection. Through the use of IPC $ network vulnerability scanner found security vulnerabilities in the host Trojans implants to control the
Antitrojan
- 杀木马程序源代码-Trojans kill the source code