Description: good backdoor code, used some technology-driven process to conceal, hide the registry, and I hope to help everyone
- [Drv_HideFile] - achieve the driver layer of documents hi
- [Hacker_Defender] - backdoor kernel-level software, users of
- [Registry_Class] - very convenient to operate a category of
- [RmtDll] - remote threads for embedded Trojan hidde
- [wavelet_lab2] - pair of 2-dimensional images DWT, decomp
- [T-ProcMon] - hidden code-driven process can be seen T
- [truecryptsc] - paper-driven process can be used to hide
- [ICMP] - protocol icmp backdoor, using connection
- [xHook] - The HOOK on the SOCKET all API function
- [ForceKillPs] - jdiogpsnv dgjasp gdoasjg
File list (Check if you may need any files):