搜索资源列表
_936480533__def_disable
- 利用恢复SSDT来对付杀毒软件的主动防御的代码例子-resume SSDT use anti-virus software to deal with the active defense of code examples
DELPHI_SSDT
- DELPHI恢复SSDT源码 有搞这方面的人可以学习一下
DELPHI_RecoverSSDT.rar
- DELPHI恢复SSDT winXP D7编译通过,Delphi Recover SSDT
Ring3SSDT
- windows 用户态 感染驱动, 恢复ssdt-windows user state infected drive and restore SSDT
RestoreSSDT
- 恢复SSDT的超强源代码,直接读取原始SSDT地址表,可查看并修复所有SSDT。-To restore SSDT super source code, direct read SSDT original address table, you can review and fix all the SSDT.
NtReadVirtualMemorysswe
- SSDT 下恢复 ntreadvirtualmemory 对抗一些反病毒程序 -SSDT resume ntreadvirtualmemory against some anti-virus program
ssdthooktest
- 易语言也一样能实行恢复SSDT表和SSDT SHODOW-ssdt
SSDT
- 恢复SSDT的代码,用来干什么自己想吧 主程序在vc下编译通过,驱动用winddk编译-Restore SSDT code, for what they want to compile it by the main program in the vc, driver compiled with winddk
Ring3ReSDDTVC
- Ring3 下恢复SSDT完整的VC源代码-Ring3 SSDT resume full source code VC
SecTools
- 系统辅助工具源码,大部分功能在R3下实现,只有SSDT恢复通过驱动实现-System aids source, to achieve most of the features in R3, only achieved through the drive to restore SSDT
XueTr
- 1.进程、线程、进程模块、进程窗口、进程内存信息查看,热键信息查看,杀进程、杀线程、卸载模块等功能 2.内核驱动模块查看,支持内核驱动模块的内存拷贝 3.SSDT、Shadow SSDT、FSD、KBD、TCPIP、IDT信息查看,并能检测和恢复ssdt hook和inline hook 4.CreateProcess、CreateThread、LoadImage、CmpCallback、BugCheckCallback、Shutdown、Lego等Notify Routine信息查
SSDTRecovery
- 简单的SSDT ring0级恢复,方法是导出SSDT表最原始的位置,记录下来,然后打开程序对比其他进程是否更改SSDT位置,如果更改了,则用原始SSDT覆盖。-Simple SSDT ring0-level recovery method is to export the location of the most original SSDT table, record, and then open the program compared to other process is to chang
SSDT
- SSDT钩子恢复,可以检测SSDT函数是否被挂钩,并可以恢复-SSDT hook recovery, you can detect whether hook SSDT function, and can be restored
610241
- 易语言也一样能实行恢复SSDT表和SSDT SHODOW()
yvzwcq
- 易语言也一样能实行恢复SSDT表和SSDT SHODOW()