搜索资源列表
filemon
- 纯汇编写的,主要拦截KERNEL32.DLL中的OpenFile、CreateFileA、CreateFileW、ReadFile、 ReadFileEx、WriteFile、WriteFileEx、DeviceIoControl等函数,HOOK到的数据未做过滤处理。 其中MYDLL利用了skyer的HOOKAPI LIB,放出源码,主程序的过程是创建进程后挂起,注入MYDLL后恢复进程,拦截过程中的相关函数
Delay_time
- 用C编写的微秒级精确延时DLL函数库,通过调用kernel32.dll的QueryPerformanceFrequency()、QueryPerformanceCounter()函数实现。
getKernel32Base
- getKernel32Base,用于取Kernel32.dll的基地址,一种很简单的方法
模块-API-读内存字节集
- 模块-API-读内存字节集 6.StrToIntExA //十六进制转换十进制 7.CloseHandle //关闭指定句柄 8.ReadProcessMemory //读出当前进程的记忆内容也就是内存的数据 .DLL命令 _内存读整数, 整数型,kernel32.dll , "ReadProcessMemory" .参数 hProcess, 整数型, , 进程句柄 .参数 lpBaseAddress, 整数型, , 内存地址
ShellCode
- shellcode辅助开发工具,漏洞攻击好帮手-Shellcode assisted development tools, vulnerability to attack a good helper
fs
- 防杀程序 防止恶意结束程序,动态加载KERNEL32.DLL来实现 -Anti-kill procedures to prevent the malicious end of the procedure, dynamic load KERNEL32.DLL to achieve ....
Injector
- BOOL InjectDLL(DWORD ProcessID) { HANDLE Proc char buf[50]={0} LPVOID RemoteString, LoadLibAddy if(!ProcessID) return false Proc = OpenProcess(CREATE_THREAD_ACCESS, FALSE, ProcessID) if(!Proc) { sprintf
first
- shellcode 打开一个command的shellcode 大家看看 如果是你所需要的谢谢 -shellcode opens a command of the shellcode take a look if you need Thank you
interNetCtrl
- PB 调用网络连接控件, 调用函数库"wininet.dll","KERNEL32.DLL"-PB called network connection control,"wininet.dll","KERNEL32.DLL"
CoreDll(2)
- 在Windows CE下,coredll.dll的作用相当于Win32的kernel32.dll -In the Windows CE under, coredll.dll the role of the equivalent of Win32' s kernel32.dll
libzplay-1.02-source
- libZPlay是解析mp3, ogg, ac3, flac, wav and pcm 种格式的多媒体库的源码,整合支持所有格式的解码器。你不需要额外的lib。仅使用kernel32.dll, user32.dll, gdi32.dll 和 winmm.dll,微软Windows标准库。也不需要mfc和.net的支持,只是纯粹的WINAPI。简单几行代码就可以实现播放-libZPlay multimedia library for playing mp3, ogg, ac3, flac, wav
get-kernel32
- 通过搜索内存地址,获得kernel32.dll在内存中的基地址,同样的方法适用于其他dll的搜索-search the memory to find the base address of kernel32.dll
Hidekernel32_Src
- 进程中隐藏动态库的驱动源码,例子为在explorer.exe中隐藏 kernel32.dll,测试通过!-Process of dynamic database-driven hidden source code, examples in explorer.exe to hide kernel32.dll, tested!
20081122259753
- 13个WINDOWS DLL的API声明模块,包括:Advapi32.dll Comdlg32.dll Gdi32.dll Imm32.dll Kernel32.dll Lz32.dll Mpr32.dll Netapi32.dll She -13 WINDOWS DLL' s API declaration module, including: Advapi32.dll Comdlg32.dll Gdi32.dll Imm32.dll Kernel32.dll Lz32.dll Mpr3
shellcode
- shellcode资料及代码 突破防火墙 构造字符串 复用端口 分段传送 动态复用端口-shellcode information and code reuse string break firewall port sub-structure dynamic multiplexing transmission port
NoImport
- 公用模块:_GetKernel.asm根据程序被调用的时候堆栈中有个用于 Ret 的地址指向 Kernel32.dll 而从内存中扫描并获取 Kernel32.dll 的基址 -Public modules: _GetKernel.asm according to the procedure is called when there is a stack of address points for Ret and Kernel32.dll scan from memory and get
ReadFile
- 用于演示从文件中读取一行数据,然后多文件中读取指定的数据 例如: 文本中内容为 C:\WINDOWS\system32\kernel32.dll 取出此行中 kernel32 <模块名> 并以文件方式输出-Used to demonstrate a row of data read from the file, and then reads the specified multi-file data such as: the text content
anti-DLL-injection
- 易语言防DLL注入, API_GetProcAddress (API_GetModuleHandle (“kernel32.dll”), “LoadLibraryA”)-easy language anti DLL injection
dll
- C#工具库 kernel32.dll 可以用于读内存数据什么的(C# Library kernel32.dll can read memory data)