-
-
[
Visual C++ (VC++)]
SmallTrojy.rar
small Trojan will be able to control the server following actions : 1. Close pop-up drive two. Mobile mouse 3. Display discredit 4. Close Display 5. Editor and allow access to the server machine Speakers played music box 6. Send information to the text ...
-
-
[
Delphi]
fantanmuma.rar
rebound of a Trojan horse, Trojan learn good programming source, the original, is not a very good thing
-
-
[
C/C++]
HideProcessHookMDL.rar
driven programming intercepted by the kernel function and realize hidden process, the current Trojan generally choose this technology
-
-
-
[
Visual C++ (VC++)]
Pe-file_infector.rar
PE File infection : an example, used to demonstrate the windows PE format injected other code. This example is a document open cmd.exe. Of course, the other can read the code, or even Trojan.
-
[
Delphi]
jcjs.rar
Delphi process of writing a surveillance procedures, real-time process monitoring activities, can automatically process the end of Trojan horse virus.
Category:
Delphi VCL Upload User:
ty_tjkq Size:
181K
-
[
Visual C++ (VC++)]
SelfDelete3.rar
many Trojan program involving the use of automatic destruction technologies, the procedures used vc demonstration of a simple self-destruct procedure