搜索资源列表
RmExec
- 远程注入的令一种方法: 本例子是利用远程注入让EXPLORER.exe加载CMD.EXE。注意,只能用RELEASE版本,如果想用DEBUG版本,可以把远程函数注入部分(remote.cpp)写成LIB连接接入即可。-leading to the remote injection method : This example is the use of telemedicine for EXPLORER.exe loaded into CMD.EXE. Attention, which can
c++buildercom编程
- 一个基于COM对象的服务器和客户机程序运行ComClient.exe前,一定要注ComSever.dll,否则会出错。利用OLE自动化编程的实用程序 运行SendTextToWord.exe前,你的计算机中一定要安装Word97字处理软件,否则会出错。编制一个图像浏览器的ActiveX控件将生成的文ImageViewProj1.cab、ImageViewProj1.inf和ImageViewProj1.htm拷贝到C:\\Inetpub\\wwwroot目录下,若要在网上浏览,必须启动个人Web
Inject.rar
- exe远程注入源代码,可将线程函数直接注入远程进程,无需dll,exe into the source code of the remote can be threaded directly into the remote process function without dll
inject
- 线程插入explor.exe,启动d-Thread insert explor.exe, start dll
wsHideDLL.zip
- Dll进程注入 一种简单的方法隐藏进程 在dll中运行代码,The simplest ways to hide a process is to have no process Basically what you need to do is place your meaningful code in a DLL, inject that DLL in an inconspicuous process (like Explorer.exe) and run your code. This can
PigYear
- 本程序类似于熊猫烧香,具体对想要注入的exe文件,可以在MainWnd.cpp中的CreateFrame函数来设置路径,默认是e盘下,a.exe文件,本程序一定要对当前目录可以运行的真实的exe操作才能有效,希望本源码能给病毒爱好者带来些许的帮助。-This procedure is similar to Panda burning incense, specific to want to inject the exe file, you can MainWnd.cpp in CreateFra
rage_vnc
- Functions: Topic parsing, supporting multi-commands Anti-Botkiller Anti-Sandbox VNC-Scanner Gets about 400-500 results a day with good ranges with around ~50 bots Finds 3.8 servers with authbypass bug. Finds passworded servers with w
inject
- 通过进程注入,将CMD.EXE重定向到网络socket 穿透防火墙,好像能被卡巴截获,呵呵,不懂就别玩了吧! 说白了,没事! -Through the process will be redirected to CMD.EXE network socket penetrate the firewall, if Kabbah can be intercepted, huh, huh, do not know how to play a bar on the other! Put it
Cheetah_Injector_v1.3_By_Riot
- an injector for memory modification and for dll s that needs an injector. so if you need the injector here it is
DLL_INJECTOR_EXE.zip
- Dll injector all the complete function. You can change program speed by open exe file or inject a process,similar as speederXp, build in vc6 no error no warning by Jesse Stone Taiwan. msn:fatalfeel@hotmail.com ,Dll injector all the complete funct
CodeHij.2007.09.06
- 用于wince上的dll注入的实现,可用于多个wince版本。sln包含一个DLL工程和一个测试用exe。可直接用VS编译运行。-Dll inject on wince,it can run on several edition of wince.the .sln include a DLL project and a exe project for test.
RemoteInject
- 一个比较完善而且简单易用的DLL注入类库 编译成lib文件 并可以同时被编译成UNICODE和ANSI版本 内有注释 经测试在XP下可以成功注入winlogon.exe-A complete and easy-to-use dll inject class library, compiled into .lib as UNICODE or ANSI versions. Has been test successfully inject dlls into winlogon.exe in
taskexxxx
- taskex inject to taskmgr.exe. very strong-taskex inject to taskmgr.exe. very strong.....
DllInsertUtil
- C++实现远程DLL注入类 C++实现的一个远程DLL注入的类。 调用类成员函数InsertDllToProcess("qq.exe", "D:\\InsertDll.dll") 可以将某个写好的DLL注入到指定的进程中。-C++ DLL into the remote class C++ DLL into a remote implementation class. Call class member function InsertDllToProcess (" qq.e
dllin_e
- 易语言注入DLL并且调用的源码 包括已经编译好的DLL exe 和源码!-Easy language to inject a DLL and call the source Including already compiled DLL exe and source code!
pe-inject
- PE-inject PE注入 有说明和程序源码 国外代码-PE-inject is a special library which allows developers to place their own code into Windows executable files (EXE, DLL, OCX and others).
PEHook
- 通过修改exe达到注入DLL的功能,然后调用DLL的某个函数。-modify exe to inject dll, and then call the dll function.
PE-inject-in-head
- Simple PE infector contributing code in the header. Gratitude for: Sars / wasm and personal pr0m1x/EOF. Pre folder, create a folder C: \ Polygon Contamination will be conducted in order that there. In the bin folder to collect a01.
Remote-thread-inject-code
- 远程EXE线程注入(《Windows信息安全实践教程》一书中的源代码。2个程序:1)注入程序testcom 2)被注入程序sever。testcom将sever作为线程注入到系统进程中使其上网(32位win7环境效果更好),CMD使用方法:>testcom.exe 进程id-Remote thread inject code book Information security practice tutorial for windows .There are two programs:
Inject(2018.01.24)
- 使用到的工具 IDA6.0 LordPE C32Asm 由于自己写了个MemoryLoader注入所以一开始考虑的是找不到hyxd.exe进程导致的注入失败 后修改为FindWindow通过窗口标题注入进程也无法正常使用 于是打开IDA 分析DLL流程(DLL Hook FindWindowA)