搜索资源列表
DLL_LPK
- DLL劫持技术当一个可执行文件运行时,Windows加载器将可执行模块映射到进程的地址空间中,加载器分析可执行模块的输入表,并设法找出任何需要的DLL,并将它们映射到进程的地址空间中。-DLL hijacking as an executable file is run, Windows loader maps the executable module to the process' s address space, executable module loader of the inp
Loader
- 在魔兽中显示文字。类似HF,VS。 详见http://blog.csdn.net/langyanduan/article/details/7337290-Display text in a World of Warcraft. Similar HF, VS.
x32_HookExp
- Inject easy pe-loader code into Explorer (x32) and load module in this process. Playload create in obj file(masm32), linked in Visual Studio
Memory-Run
- 内存加载程序并运行,程序是易语言开发的.-The Memory Loader and run, the program is easy to language development.