Any rat/trojan horse will give you control over the whole computer. There is also this http://www.itsecuritas.net/tutorials/metasploit-tutorials-turn-on-and-listen-on-anyone-s-computer-microphone...