-
-
[
Delphi]
AppEmbed.rar
EXE embedded to any of their proceedings, from which we can understand that the spread of Trojan horses and viruses and thus to carry out defense.
-
-
[
Others]
Ice_Trojan_experimental_invasion_and_protection.ra
Ice Trojan experimental invasion and protection. Through the use of IPC $ network vulnerability scanner found security vulnerabilities in the ... Trojans implants to control the remote host, and then killing the Trojan on the client to carry out protection.
-
-
-
[
C/C++]
horse.rar
VB QQ Trojan source code, the new Q has not only learn
-
-
-
-
[
Visual C++ (VC++)]
key22.zip
Soft-screen keyboard, directly with the adsorption function, to prevent backdoor Trojan horse and all the hook