搜索资源列表
ssdt.
- Delphi开发驱动的一个例子 1.映射ntoskrnl.exe到内存 2.重定位信息... 3.搜索SSDT基址 4.补丁回去
SSDT Unhook
- 恢复SSDT,干什么用的自己想吧
RING0.RING0下检测用HOOK SSDT隐藏进程的代码
- RING0下检测用HOOK SSDT隐藏进程的代码,直接build,适用于XP,2000系统。短小实用。,RING0 detect hidden process by HOOK SSDT code directly build, apply to XP, 2000 systems. Short and practical.
Su1xDriver 该驱动通过hook ssdt ZwOpenProcess
- 该驱动通过hook ssdt ZwOpenProcess,来保护保护suserice.exe。 只是练练手,含金量不高。 锐捷客户端Su1xDriver.sys逆向,附源码-The drive through the hook ssdt ZwOpenProcess, to protect the protection suserice.exe. Just practice your hand, gold is not high. Ruijie client Su1xDriver.s
RestoreShadow.rar
- Ring0下恢复SSDT Shadow。,Restore SSDT Shadow.
SSDT.rar
- delphi的驱动 功能是恢复ssdt的地址.,delphi functions is to restore the drive ssdt address.
Klog1.0 比挂钩SSDT还要底层的
- 比挂钩SSDT还要底层的,位于键盘硬件设备驱动之上的键盘过滤驱动源码,欢迎下载研究。-Designing A Kernel Key Logger A Filter Driver Tutorial By Clandestiny
Miss920
- Miss920程序行为监视器,运用SSDT HOOK技术,可以简单有效的监控程序行为,现在已经实现了进程监控,文件监控,注册表监控,并且可以有效快捷地进行二次开发。-Miss920 monitor program behavior, the use of SSDT HOOK technology, can be simple and effective monitoring of program behavior, the process has already been realized to
HookSSDT
- hook SSDT 表保护进程,防止进程被非法结束-hook SSDT biao bao hu jin cheng
ProtectMon
- 驱动开发,根据PID保护进程,HOOK了 SSDT NtOpenProcess函数,至少可以抵御一切R3病毒终结你的进程!!适合新手学习HOOK ssdt的入门研究-Driven development, the protection under the PID process, HOOK the SSDT NtOpenProcess function, at least the end of you against all the process of virus R3!! Suitabl
MyIS
- 一个类似icesword的东西,驱动级,有显示进程、内核模块、启动组、SSDT、消息钩子、等功能。-A similar icesword things, drive level, showing the process, the kernel module, start the group, SSDT, news hooks, and other functions.
SSDT-Shadow-Hook
- Hook 了以下函数: NtUserFindWindowEx FindWindow NtUserGetForegroundWindow GetForegroundWindow NtUserQueryWindow GetWindowThreadProcessId NtUserWindowFromPoint WindowFromPoint NtUserBuildHwndList EnumWindows NtUserSetWindowLong SetWindowLong
SSDT
- 通过伪造SSDT表绕过360,安全卫士等杀毒软件主动防御-SSDT table to bypass 360 by forging, security guards and other anti-virus software, Active Defense
antiTX
- 1.恢复shadow ssdt 2.恢复 NtReadVirtualMemory NtWriteVirtualMemory NtOpenProcess NtOpenThread KiAttachProce-1.恢复shadow ssdt 2.恢复 NtReadVirtualMemory NtWriteVirtualMemory NtOpenProcess NtOpenThread KiAttachProcess
Kehook
- 对于hook,从ring3有很多,ring3到ring0也有很多,根据api调用环节递进的顺序,在每一个环节都有hook的机会,可以有int 2e或者sysenter hook,ssdt hook,inline hook ,irp hook,object hook,idt hook-The hook, from ring3 there are many, ring3 to ring0 there are many, according to api call progressive sequen
reSSDT
- 恢复SSDT突破主动防御,基于c++实现。-Breakthrough initiative to restore SSDT defense, c++ to achieve.
SSDT_Unhook
- SSDT恢复源代码,恢复被挂钩的SSDT(系统服务调用函数表)-SSDT unhook sourcecode
Ring0RestoreSSDTShadow
- Ring0下恢复SSDT Shadow,是一个完整的VC工程,可以学习学习。-Ring0 resume SSDT Shadow
driver
- 恢复ssdt 躲过杀软查杀,有利于*进一步存活!-Soft-recovery ssdt escape the killing killing are conducive to the further survival of Trojan!
CCRootkit-V0.1
- 一般网上找到的都是需要Ring3传输需要补丁的地址过去... 002就是直接用最标准的方法进行SSDT定位以及修复的 支持多核系统,当然还有003(加入shadow ssdt hook),004(加入inline hook) 基本上是现在最稳定的恢复方式了,大家可以用KMDLoader测试.加载就脱钩.不需要通讯 -Generally find on the Internet are required Ring3 address transmission needs a patc