搜索资源列表
NtOpenProcessSSDTHook
- 驱动级SSDT 钩子 打造完美不死程序 挂接NtOpenProcess 函数,防护进程不被关闭-SSDT hooks create the perfect drive-level program articulated NtOpenProcess die function, the process of being shut down protection
ProtectMon
- 驱动开发,根据PID保护进程,HOOK了 SSDT NtOpenProcess函数,至少可以抵御一切R3病毒终结你的进程!!适合新手学习HOOK ssdt的入门研究-Driven development, the protection under the PID process, HOOK the SSDT NtOpenProcess function, at least the end of you against all the process of virus R3!! Suitabl
SSDT-HOOK
- XP下SSDT Hook ZwCreateThread的代码,仅适用于XP,由驱动和用户模式下控制程序组成,是从以前写的另一个程序修改过来的,所以代码中部分结构体的成员的定义是多余的,要写SSDT Hook的可以参考一下-XP, SSDT Hook ZwCreateThread code only applies to XP, drivers and user mode by the control program component is written in another program
MyIS
- 一个类似icesword的东西,驱动级,有显示进程、内核模块、启动组、SSDT、消息钩子、等功能。-A similar icesword things, drive level, showing the process, the kernel module, start the group, SSDT, news hooks, and other functions.
Ring3SSDT
- Ring3下安全获取原始SSDT地址 enjoy it-Ring3 under secure access to the original SSDT Address enjoy it
SDTrestore-0.2
- SSDT 恢复代码 SSDT 恢复代码-SSDT code to restore to restore SSDT code
SSDT-Shadow-Hook
- Hook 了以下函数: NtUserFindWindowEx FindWindow NtUserGetForegroundWindow GetForegroundWindow NtUserQueryWindow GetWindowThreadProcessId NtUserWindowFromPoint WindowFromPoint NtUserBuildHwndList EnumWindows NtUserSetWindowLong SetWindowLong
Ring3SSDT
- windows 用户态 感染驱动, 恢复ssdt-windows user state infected drive and restore SSDT
RestoreSSDT
- 恢复SSDT的超强源代码,直接读取原始SSDT地址表,可查看并修复所有SSDT。-To restore SSDT super source code, direct read SSDT original address table, you can review and fix all the SSDT.
antiTX
- 1.恢复shadow ssdt 2.恢复 NtReadVirtualMemory NtWriteVirtualMemory NtOpenProcess NtOpenThread KiAttachProce-1.恢复shadow ssdt 2.恢复 NtReadVirtualMemory NtWriteVirtualMemory NtOpenProcess NtOpenThread KiAttachProcess
vice
- 能够找出给种类型的系统Hook,包括IAT表,SSDT表等相关的钩子-VICE is a tool to find hooks. Features include: 1. Looks for people hooking IAT s. 2. Looks for people hooking functions in-line aka detouring. 3. Looks for hooks in the System Call Table. Thanks to Tan perh
Kehook
- 对于hook,从ring3有很多,ring3到ring0也有很多,根据api调用环节递进的顺序,在每一个环节都有hook的机会,可以有int 2e或者sysenter hook,ssdt hook,inline hook ,irp hook,object hook,idt hook-The hook, from ring3 there are many, ring3 to ring0 there are many, according to api call progressive sequen
antihook_src
- 创建一个内核驱动,伪造一个ssdt表,使得ssdt钩子失效。-Create a kernel driver, forged a ssdt table, making failure ssdt hook.
biostelnet
- 向BIOS中植入模块,HOOK中断向量表,HOOK NTLDR加载过程以及HOOK内核函数,SSDT hook。-Add module into bios,HOOK IVT,HOOK NTLDR loder process and hook knrnel function,just as SSDT HOOK
SSDTdemo
- 驱动文件ssdt恢复的实例,不错的源码。-ssdt examples of recovery, a good source.
reSSDT
- 恢复SSDT突破主动防御,基于c++实现。-Breakthrough initiative to restore SSDT defense, c++ to achieve.
Ring0
- Ring0中Hook SSDT防止进程被结束
Registry_protection
- 在内核状态下拦截注册表操作,保护您的注册表不受病毒和木马修改。主要是通过ssdt hook实现,含有完整的代码,包括与应用层通信,和界面代码.-State in the core to intercept registry operation to protect you from viruses and Trojan registry modifications. Mainly through the realization of ssdt hook, contains a complete
SSDThooksample
- 比较流行的 hook ssdt技术 系统内核钩子-Hook ssdt more popular hook-core technology systems
SSDTunhook
- SSDT UNHOOK DELPHI CODE