Description: nameless would like to complete it as we all know, it is a powerful software to generate the horse, you can modify the source code, customize their own horse
To Search:
- [doorFile] - Based on the socket of a backdoor Trojan
- [jieba] - Password king third-generation source, P
- [pe2trojansrc] - Function is very powerful horse, can be
- [NameLess114] - The source code of NameLe
- [NameLessBackDoorV1.14] - a nameless backdoors. . Very classic
- [wenjianmuma] - Is a Trojan horse on the file on the sou
- [5] - Rebound-type Trojan Communication Techno
File list (Check if you may need any files):
Command
.......\AR.h
.......\CleanEvent.h
.......\Execute.h
.......\FileTime.h
.......\Findpass.h
.......\ListIP.h
.......\Process.h
.......\Service.h
.......\Shell.h
.......\Shield.h
.......\Shutdown.h
.......\Sysinfo.h
.......\TcpList.h
.......\TermService.h
.......\User.h
.......\ViewKey.h
.......\Wget.h
Common
......\DebugEx.h
......\GetString.h
......\Libctiny.lib
......\RegEditEx.h
NameLess.cpp
NameLess.def
NameLess.dsp
NameLess.dsw
NameLess.h
Release
Sniffer
.......\Sniffer.h
Socket
......\Socket.h
爱国者黑客.TXT