顶楼存放更新信息
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
攻Billy Belceb 病毒编写教程for Win32 翻译:onlyu 583K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3I4i4K6u0W2K9s2c8E0f81K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3I4x3q4)9J5k6h3S2@1L8b7`.`.d66K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3I4x3g2)9J5k6h3S2@1L8b7`.`.5eaK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3I4x3W2)9J5k6h3S2@1L8b7`.`.afeK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3J5i4K6u0W2K9s2c8E0717K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3K6i4K6u0W2K9s2c8E0689K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3@1i4K6u0W2K9s2c8E090bK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3#2i4K6u0W2K9s2c8E044dK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3$3i4K6u0W2K9s2c8E0581K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3%4i4K6u0W2K9s2c8E073aK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3^5i4K6u0W2K9s2c8E0725K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4m8W2k6r3W2&6i4K6u0W2j5$3!0E0i4K6u0r3j5X3u0K6K9s2c8E0L8q4)9J5c8X3u0T1M7K6k6Q4x3V1k6H3k6h3c8A6P5e0j5#2y4K6R3&6i4K6u0W2K9s2c8E0多态变形技术 翻译:看雪PTGhttp://bbs.pediy.com/showthread.php?t=26510PE病毒学习笔记 作 者: kmychttp://bbs.pediy.com/showthread.php?t=52777http://bbs.pediy.com/showthread.php?t=52630驱动感染技术扫盲(C描述) 作 者: 老Yhttp://bbs.pediy.com/showthread.php?t=56042 微软研究院Detour开发包之API拦截技术 作 者: shangzhhttp://bbs.pediy.com/showthread.php?t=38759向其他程序注入托管程序集 作 者: foxabuhttp://bbs.pediy.com/showthread.php?t=47860 GhostWriting: Writing to another process without opening it nor actually writing to it 投递:笨笨雄158K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0G2L8%4c8C8K9i4c8Q4x3X3g2U0L8$3#2Q4x3V1k6F1k6i4N6K6M7X3g2S2k6q4)9J5k6i4m8Z5M7q4)9K6c8X3&6W2N6%4y4A6k6q4)9K6c8o6j5^5z5b7`.`.
防【翻译】注入 动态生成及混淆的恶意代码的检测 作 者: aalloverredhttp://bbs.pediy.com/showthread.php?t=35766 【翻译】数字基因组测图 - 高级二进制分析技术 作 者: 月中人http://bbs.pediy.com/showthread.php?t=35103【翻译】分析蠕虫及压缩的网络流量 作 者: cehnhttp://bbs.pediy.com/showthread.php?t=33247Fighting EPO Viruses 投递:笨笨雄625K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4k6^5i4K6u0W2L8X3g2@1L8s2g2^5i4K6u0W2L8%4u0Y4i4K6u0r3L8r3W2T1i4K6u0r3j5i4m8T1x3o6m8Q4x3X3g2Z5N6r3#2D9
RootKit【原创】虚拟桌面技术的初步探讨 作 者: newjueqihttp://bbs.pediy.com/showthread.php?t=82537[POC]基于IO Packet隐藏文件和注册表,过磁盘解析和总线解析 作 者: QIQIhttp://bbs.pediy.com/showthread.php?t=75007N种内核注入DLL的思路及实现 作 者: sudamihttp://bbs.pediy.com/showthread.php?t=75887RootKit hook 作 者: combojianghttp://bbs.pediy.com/showthread.php?t=57900 http://bbs.pediy.com/showthread.php?t=58199http://bbs.pediy.com/showthread.php?t=59127http://bbs.pediy.com/showthread.php?t=59867http://bbs.pediy.com/showthread.php?t=60022http://bbs.pediy.com/showthread.php?t=60247http://bbs.pediy.com/showthread.php?t=60778rootkit 直接访问硬件 作 者: combojianghttp://bbs.pediy.com/showthread.php?t=62020 http://bbs.pediy.com/showthread.php?t=62061http://bbs.pediy.com/showthread.php?t=62081rootkit ring3进ring0之门系列 作 者: combojianghttp://bbs.pediy.com/showthread.php?t=62263http://bbs.pediy.com/showthread.php?t=62336http://bbs.pediy.com/showthread.php?t=62510http://bbs.pediy.com/showthread.php?t=62680也谈rootkit 注册表信息隐藏 作 者: combojianghttp://bbs.pediy.com/showthread.php?t=63540【翻译】Professional.Rootkits 作 者: kuang110http://bbs.pediy.com/showthread.php?t=63653http://bbs.pediy.com/showthread.php?t=63871http://bbs.pediy.com/showthread.php?t=65987http://bbs.pediy.com/showthread.php?t=70828http://bbs.pediy.com/showthread.php?t=71262shadow ssdt学习笔记 作 者: zhuwghttp://bbs.pediy.com/showthread.php?t=56955Windows内存隐藏技术初探 作 者: NetRochttp://bbs.pediy.com/showthread.php?t=56689一种Object hook的思路和实现过程 作 者: sudamihttp://bbs.pediy.com/showthread.php?t=70329 使PsSetCreateProcessNotifyRoutine等3个函数设置的监控历程从内核中脱链 作 者: drcoolhttp://bbs.pediy.com/showthread.php?t=70531科普之三招隐藏进程 作 者: cooldiyerhttp://bbs.pediy.com/showthread.php?t=73129导出表钩子------EAT HOOK 作 者: Sysnaphttp://bbs.pediy.com/showthread.php?t=62574
防CsrWalker - using csrss as rkdetector 投递:笨笨雄399K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0G2L8%4c8C8K9i4c8Q4x3X3g2U0L8$3#2Q4x3V1k6F1k6i4N6K6M7X3g2S2k6q4)9J5k6i4m8Z5M7q4)9K6c8X3&6W2N6%4y4A6k6q4)9K6c8o6V1H3z5l9`.`.基于交叉引用的搜索检测object hook 作 者: sudamihttp://bbs.pediy.com/showthread.php?t=72608Vista System Restore Rootkit 原理及检查 投递:笨笨雄d3cK9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6i4u0G2L8%4c8C8K9i4c8Q4x3X3g2U0L8$3#2Q4x3V1k6$3j5i4g2D9N6q4)9J5c8X3y4S2M7X3c8E0j5h3N6A6j5#2)9J5c8V1S2u0g2o6t1H3x3o6S2Q4y4h3k6o6j5i4u0V1e0h3q4Y4K9h3y4Q4x3X3g2H3M7s2b7`.端口访问监控原理 作 者: NetRochttp://bbs.pediy.com/showthread.php?t=65903【翻译】被占用文件操作三法 作 者: libradohkohttp://bbs.pediy.com/showthread.php?t=39001 检测隐藏进程 作 者: princehttp://bbs.pediy.com/showthread.php?t=22530寻找原始表,恢复 ssdt 表 作 者: dummyhttp://bbs.pediy.com/showthread.php?t=49848NTFS损坏修复 投递:笨笨雄db5K9s2c8@1M7q4)9K6b7g2)9J5c8W2)9J5c8Y4N6%4N6#2)9J5k6h3&6@1k6Y4y4Q4x3X3g2U0L8$3#2Q4x3V1k6F1N6r3k6K6i4K6g2X3M7X3g2U0L8%4k6W2M7Y4W2Q4y4h3k6U0L8$3&6U0k6i4m8@1M7#2)9J5k6h3S2@1L8b7`.`.
攻《The Shellcoder's handbook》翻译汇总及勘误 作 者: arhathttp://bbs.pediy.com/showthread.php?t=35849堆溢出技巧 WINXPSP2可用 作 者: Hannibalhttp://bbs.pediy.com/showthread.php?t=54932 [翻译]Windows远程内核漏洞注入 作 者: 北极星2003http://bbs.pediy.com/showthread.php?t=19671【翻译】Exploiting Windows Device Drivers 作 者: ayareihttp://bbs.pediy.com/showthread.php?t=74535
防基于栈指纹检测缓冲区溢出的一点思路 作 者: 孤烟逐云http://bbs.pediy.com/showthread.php?t=49276 【翻译】深入剖析编译器安全检查机制 作 者: zhzhtsthttp://bbs.pediy.com/showthread.php?t=49873