搜索资源列表
wpack1
- 使用下面的库 kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32.lib advapi32.lib shell32.lib ole32.lib oleaut32.lib uuid.lib odbc32.lib odbccp32.lib 可以封装用户自己的以太网链路收发报文. -use of the library kernel32.lib user32.lib gdi32.lib winspool.lib comdlg32
filemon
- 纯汇编写的,主要拦截KERNEL32.DLL中的OpenFile、CreateFileA、CreateFileW、ReadFile、 ReadFileEx、WriteFile、WriteFileEx、DeviceIoControl等函数,HOOK到的数据未做过滤处理。 其中MYDLL利用了skyer的HOOKAPI LIB,放出源码,主程序的过程是创建进程后挂起,注入MYDLL后恢复进程,拦截过程中的相关函数
KnightOnLine
- KnightOnLine Private Declare Sub mouse_event Lib \"user32\" (ByVal dwFlags As Long, ByVal dx As Long, ByVal dy As Long, ByVal cButtons As Long, ByVal dwExtraInfo As Long) Private Declare Function SetCursorPos Lib \"user32\" (ByVal X As Long, ByVa
Delay_time
- 用C编写的微秒级精确延时DLL函数库,通过调用kernel32.dll的QueryPerformanceFrequency()、QueryPerformanceCounter()函数实现。
getKernel32Base
- getKernel32Base,用于取Kernel32.dll的基地址,一种很简单的方法
comcool_code
- 介绍: 介绍如何在Win32中处理串口。串口通讯可以通过多种技术实现,例如:ActiveX,I/O存取和文件操作。本文介绍Win32平台下通过文件操作技术使用串口。程序员可以使用 Microsoft Visual C++ Version 6.0所提供的kernel32.lib。在Microsoft Windows(2000,Me,XP and 95/98)中,串口作为文件处理。因此可以通过Windows文件创建函数打开串口。 文章不仅介绍了串口通讯,也介绍了在串口通讯应用程序中实现
读取系统信息
- 通过Public Declare Sub GetSystemInfo Lib kernel32 (lpSystemInfo As SYSTEM_INFO)等的api函数取得系统的消息。是一个比较全的取得系统消息的集合-through Public Declare Sub GetSystemInfo Lib kernel32 (lpSystemInfo As SYSTEM_INFO) api function of the system made news. A comparison is mad
读写SQL中的image字段.zip
- Private Declare Function DeleteFile Lib "kernel32" Alias "DeleteFileA" (ByVal lpFileName As String) As Long '************************************************************* Public Function ImportPhoto(sPicFile As String, sEmpID As
模块-API-读内存字节集
- 模块-API-读内存字节集 6.StrToIntExA //十六进制转换十进制 7.CloseHandle //关闭指定句柄 8.ReadProcessMemory //读出当前进程的记忆内容也就是内存的数据 .DLL命令 _内存读整数, 整数型,kernel32.dll , "ReadProcessMemory" .参数 hProcess, 整数型, , 进程句柄 .参数 lpBaseAddress, 整数型, , 内存地址
ShellCode
- shellcode辅助开发工具,漏洞攻击好帮手-Shellcode assisted development tools, vulnerability to attack a good helper
ShellCode
- ShellCode分析,溢出攻击-Shellcode analysis, overflow attacks
ApiInDllDlg
- 通过直接调用动态链接库中的函数来完成API函数的调用,分别调用动态链接库Kernel32.lib,shell32.lib和user32.lib中的一个函数-Through a direct call to dynamic-link library of functions to achieve API function to be called separately DLL Kernel32.lib, shell32.lib and user32.lib a function
fs
- 防杀程序 防止恶意结束程序,动态加载KERNEL32.DLL来实现 -Anti-kill procedures to prevent the malicious end of the procedure, dynamic load KERNEL32.DLL to achieve ....
ddd
- 硬盘注册码,主要是算法根据硬件编号生成注册号-Private Declare Function GetVolumeInformation& Lib "kernel32" _ Alias "GetVolumeInformationA" (ByVal lpRootPathName _
ClipBoard
- VC++下监视剪贴板数据,利用树状视图看文件目录-look at the clipboard正在创建临时文件“i:\reading_book_and_doing_programm\Tst7_1\Debug\RSP000013.rsp”,其内容为 [ /Od /D "WIN32" /D "_DEBUG" /D "_WINDOWS" /D "_MBCS" /Gm /EHsc /RTC1 /MLd /Fo"Debug/" /Fd"Debug/vc70.pdb" /W3 /c /Wp64 /ZI
interNetCtrl
- PB 调用网络连接控件, 调用函数库"wininet.dll","KERNEL32.DLL"-PB called network connection control,"wininet.dll","KERNEL32.DLL"
CoreDll(2)
- 在Windows CE下,coredll.dll的作用相当于Win32的kernel32.dll -In the Windows CE under, coredll.dll the role of the equivalent of Win32' s kernel32.dll
get-kernel32
- 通过搜索内存地址,获得kernel32.dll在内存中的基地址,同样的方法适用于其他dll的搜索-search the memory to find the base address of kernel32.dll
Win_kernelref
- Windows kernel32 library
kernel32
- 系统文件kernel32,系统源文件希望对大家有帮助-System file kernel32, system source files we want to help