搜索资源列表
DLL_LPK
- DLL劫持技术当一个可执行文件运行时,Windows加载器将可执行模块映射到进程的地址空间中,加载器分析可执行模块的输入表,并设法找出任何需要的DLL,并将它们映射到进程的地址空间中。-DLL hijacking as an executable file is run, Windows loader maps the executable module to the process' s address space, executable module loader of the inp
anti-ssdt
- Windows XP是通过sysenter调用KiFastCallEntry将ntdll.dll的调用切换到内核的。KiFastCallEntry的原理是通过在SSDT中查找函数地址跳转。所以只要伪造一张原始SSDT,就可以使得SSDT-HOOK无效了。-Windows XP by calling KiFastCallEntry sysenter ntdll.dll call will switch to the kernel. KiFastCallEntry SSDT principle i
Ucontrol
- 能用自己的程序去控制U盘的关与开,这是一个源代码哟,本人研究了好久,查阅了大量的WINDOWS api资料。-The source code can control your U Driver,P S ,the file is a source,I find many windows api document and study long times.
WindowsHandlerFinder_src
- Windows Handler Finder is a application that allow you to find the handler of any opened windows of you desktop
dllhookapi
- 驱动DLL注入源码,学习驱动很好的代码.应用层和驱动层都有源代码-Here you can find source codes. Note: to compile NtProcDrv you need NTDDK to be installed on your computer. To run compiled sample, place tunew20.dll in any folder that is specified in PATH variable (windows/syst
Dibllo2_sig202_src
- 暗黑破坏神2,通过调用WindowsAPI函数。实现内存修改。查找基址,修改字节。-Diablo 2, by calling the Windows API function. Implement memory changes. Find the base, modify bytes.
