搜索资源列表
ASProxy
- spy proxy is an agent based detection of malicious web content it protect the users from internet borne malware
Malware
- 计算机病毒讲座,英文的,一个老外讲的,很好的资料。-Computer viruses lectures, in English, a foreign-speaking, and good information.
ameagle
- These documents are all classic documents relating to the domain of virus writing.Give a good insight about the virus which are rare and are considered best for case studies..many variants are still being produced and all these are original.Its very
5_Malware_Analysis_Detection
- A Book About Malware
Malware
- 恶意程序源代码,让c_time 崩溃,使系统无限注销,仅用于学习-A malware sourcecode,only for study
200761112104291
- 根据tommsoft提供的恶意软件清理工具提供的开发包,汉化整理而成,由于上次失误,没有发源代码,特重新发出! -According to tommsoft malware provided by the development of clean-up tool bag, finished order made that since the previous errors, there is no origin code, special re-issue!
scan_malware_tool_2.0
- search file list and view malware database
20104141531383
- 流氓软件扫面与清除源码 运行平台: Windows -Malware scanning and removal source operating platforms: Windows
007
- 随着计算机的发展,越来越多人用上了个人计算机,而主流的操作系统是Microsoft的Windows。这种操作系统占据着PC操作系统市场的90 以上。但问题也随之而来,越来越多的针对该平台的病毒、木马、黑客程序、恶意程序、流氓软件以及间谍程序盗窃和破坏用户数据。 研究发现,大多数上述非法程序是通过注册表来达到自启动的。那么只要我们拦截上述程序对注册表的访问,便可禁止他们启动,达到了保护用户数据的目的。在本次设计中,使用了SSDT Hook这种技术对注册表的访问进行拦截。这种拦截技术通用,功能强
MyKill
- 自己写得木马转移程序。自动查找Malware.QVM14.GEN木马,并把它转移到E:\bak目录下。-Trojan shift their written procedures. Automatically find Malware.QVM14.GEN Trojans, and to transfer it to E: \ bak directory.
anatomy-of-stealth-malware
- Anatomy of Stealt Malware, very good
Dissecting-Android-Malware
- A FILE DECRIBING ANDROID DESERTING MALWARE PDF VERSION
malware-links-parser
- Malware links parser
malware-links-parser
- Malware links parser
Malware-Armor-Blackhat-Presentation-2015_08_15.zi
- Malware Armor Blackhat Presentation 2015_08_15
Chapter 0-1
- Malware Analysis book is a guide to do reverse engineering malware
Chapter 2-3
- Malware Analysis book is a guide to do reverse engineering malware 2
Chapter 4-5
- Malware Analysis book is a guide to do reverse engineering malware 3
Chapter 6-7
- Malware Analysis book is a guide to do reverse engineering malware 4
Chapter 8-9
- Malware Analysis book is a guide to do reverse engineering malware 5