Description: pigeon-ice transition Trojan source code, including services and clients, than the traditional Trojan advantage is the local eavesdropping without opening ports, but use udp protocol for aport, OK, netstat tools such as we can hardly see. To achieve a more hidden, the procedure is a major the framework, the use of multithreading, is a directory listing, process management code realized, many of the specific functional needs of the Trojans to their development.
File list (Check if you may need any files):