登录
首页 » 加密解密 » 超级增强断点源代码!配合trw2000和sice 使用!可以调试一些反调试的外壳和程序! 用vc编译...

超级增强断点源代码!配合trw2000和sice 使用!可以调试一些反调试的外壳和程序! 用vc编译...

于 2022-01-26 发布 文件大小:4.71 kB
0 89
下载积分: 2 下载次数: 1

代码说明:

超级增强断点源代码!配合trw2000和sice 使用!可以调试一些反调试的外壳和程序! 用vc编译-Super enhance breakpoint source code! Sice tie trw2000 and use! Some anti-debugging can debug shell and procedures! Compiling with vc

下载说明:请别用迅雷下载,失败请重下,重下不扣分!

发表评论

0 个回复

  • 凯撒和维吉尼亚方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。...
    凯撒和维吉尼亚加密方法,两种算法都不是很复杂,基本原理也相似所以都写入一个文件中来表示。-Caesar and Virginia encryption method, two algorithms are not very complicated, so the basic principles are also similar to a document written to express.
    2022-12-14 15:10:03下载
    积分:1
  • RSA,MD5的Visual C++源代码v1.2
    RSA MD5 VISUAL C++ SOURCE CODE v1.2 - Visual C++ implementation of the RSA MD5 message digest algorithm. Calculates a 32byte checksum for any data sequence. Developed by Langfine Ltd. Note, RSA copyright notices must be adhered to - see the source code for details.Released November 2001-RSA MD5 VISUAL C++ SOURCE CODE v1.2- Visual C++ implementation of the RSA MD5 message digest algorithm. Calculates a 32byte checksum for any data sequence. Developed by Langfine Ltd. Note, RSA copyright notices must be adhered to- see the source code for details.Released November 2001
    2022-01-27 11:45:11下载
    积分:1
  • 代码做了什么?有时我们可能希望隐藏我们的文件内容从其他…
    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over) -What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used (In VB- The same technique can be implemented in
    2023-06-18 10:00:03下载
    积分:1
  • 使用crypt api创建一个会话钥。 在这个例子中使用了一个168位的3DES key
    使用crypt api创建一个会话密钥。 在这个例子中使用了一个168位的3DES key-use crypt api to create a session key. In this example the use of a 168 DES key 3
    2022-02-24 16:06:26下载
    积分:1
  • RC2 algorithm source code
    RC2算法源代码-RC2 algorithm source code
    2023-06-22 20:55:03下载
    积分:1
  • 最新的AES源代码,AES算法为我们提供了强大的…
    最新的AES源代码,AES加密算法为我们提供了强大快捷的对称加密方法。-the latest source code AES, AES encryption algorithm to provide us with a powerful and efficient symmetric encryption method.
    2022-11-27 00:20:02下载
    积分:1
  • 实现md5的算法。 实现md5的算法。
    实现md5的算法。 实现md5的算法。-The realization of md5 algorithms. The realization of md5 algorithms.
    2022-10-24 21:35:03下载
    积分:1
  • C的原代码,可以参考的.用一定的下在价值
    C的原代码,可以参考的.用一定的下在价值-the original C code can reference. With a certain value in the next
    2023-02-20 19:35:03下载
    积分:1
  • MD5算法java实现 * 下面这些S11
    MD5加密算法java实现 * 下面这些S11-S44实际上是一个4*4的矩阵,在原始的C实现中是用#define 实现的, 这里把它们实现成为static final是表示了只读,切能在同一个进程空间内的多个 Instance间共享*/ -MD5 algorithm to achieve java* Below these S11- S44 is a 4* 4 Moment RUF, in a primitive realization of the C# define is achieved, Here they become static final realization of the said CD. cut in the same process space within the shared among many Instance* /
    2022-03-29 19:10:51下载
    积分:1
  • delphi6写的CRC32的算法。 另有付例子程序
    delphi6写的CRC32的加密算法。 另有付加例子程序-Delphi6 CRC wrote the encryption algorithm. Another example of pay increase procedures
    2023-04-28 01:25:03下载
    积分:1
  • 696518资源总数
  • 104349会员总数
  • 32今日下载