搜索资源列表
Stuxnet-Sourcecode
- stunxnet source 源码, 将黑客技术延伸到一新的领域-stunxnet source code, hacking techniques will extend to a new area
bat_reg
- 收集的一些实用批处理,注册表修改优化,和网管实用文件。还包含dosqq,黑客帝国里的数码雨-Collected some useful batch, modify the registry optimization, and network management utility file. Also includes dosqq, Matrix' s digital rain
ThePMatrix
- 黑客帝国数字雨的matlab模拟,三维的,效果还好,电脑负荷有点大 -Matrix digital rain matlab simulation
Exe
- 流行于黑客编程Exe自杀代码,也就是自删除代码-Popular programming Exe suicide hacker code, that is, remove the code from
HKFX201105
- 黑客防线2011年5月刊.pdf 可以直接看的。-Hackers May 2011 issue of defense. Pdf can see.
木马小程序段
- 这种木马可以记录你的一些键盘输入信息,...木马会将自己的进程插入到资源管理器的进程中,然后根据黑客设置的窗口标题关键字...
Visual-CPP-hacker-programming
- Visual C++黑客编程揭秘与防范源代码-Visual C++ hacker programming expose and security source code
shuziyu
- 屏保数字雨,有点黑客帝国的味道哦。 C/C++写的SDK程序-Screensaver digital rain, Matrix a little taste of Oh. C/C++ SDK to write programs
2011_10
- 黑客防线2011年10月刊.pdf,附件包含源代码 -Hacker defense October 2011 issue. Pdf attachment that contains the source code
a
- 黑客帝国屏保源码,用易语言编写而成,非常经典,值得收藏-easylanguage
shangxinyuankong
- 上兴远程控制源代码,黑客工具参考。远程屏幕控制,资源浏览。反弹式木马。-Xing remote control on the source code, hacking tools for reference. Remote screen control, resource browsing. Rebound Trojan.
2011_9
- 黑客防线2011年9月刊.pdf,附件包含源代码 -Hacker defense in 2011. Pdf, annex contains the source code
LaBreaNT2_0
- 对付蠕虫病毒如codered,nimda等的黑客粘毒工具(NT版本)。利用网络中没有被使用的IP地址来构造一些“虚拟机器”,回复已感染计算机发出的连接请求。编译时如果出错,可以删除那些错误的include项。运行时要用到libnetNT-To deal with viruses such as worms codered, nimda visco hackers and other drugs (NT version). The use of the network has not been u
regeditwindows
- Windows安全黑客全部是注册表的修改-Windows security hackers all registry changes
windowsrunning
- Windows超级黑客得到windows运行程序的信息,很经典的-Hackers get Windows super windows run the program information, it is classic
20042817155826161
- 黑客攻学兼防-Science and anti-hacker attack
hkgxjf
- 介绍做黑客必备的几招- The introduction makes the hacker necessary several moves
Hacking-techniques-complete-set
- 黑客攻击技术一整套,很好地讲述了黑客攻击的技术,很值得细细学习。-A complete set of hacking techniques, well about the technology of hacker attacks, is worthy of careful study.
oicqmxl
- //*** *** **** // 作者:∮明天去要饭 // QICQ:305725744 // MSN:kgdiwss@hotmail.com // 黑客编程群:2585270 // Blog:http://blog.csdn.net/kgdiw-//*************// Author: ∮ tomorrow to beg// QICQ: 305725744// MSN: kgdiwss@hotmail.com// programming group of hac