Any rat/trojan horse will give you control over the whole computer. There is also this http://www.itsecuritas.net/tutorials/metasploit-tutorials-turn-on-and-listen-on-anyone-s-computer-microphone...
Type: Posts; User: gordo
Any rat/trojan horse will give you control over the whole computer. There is also this http://www.itsecuritas.net/tutorials/metasploit-tutorials-turn-on-and-listen-on-anyone-s-computer-microphone...