DL : 10
控制端采用IOCP模型,数据传输采用zlib压缩方式
稳定快速,上线数量无上限,可同时控制上万台主机
控制端自动检测CPU使用率调整自己的工作线程, 稳定高效
宿主为svchost以系统服务启动,有远程守护线程,上线间隔为两分钟。
心跳包机制防止意外掉线..
支持HTTP和DNS上线两种方式
自动恢复SSDT(这功能干什么,大家都知道,免杀自己做吧),安装本程序需要管理员权限
控制端237K,返朴归真的界面,生成的服务端无壳,111 K,可安装多个服务端
其它细节方面的功能大家自己去发现吧
功能:
文件管理 完全仿Radmin所写, 文件、文件夹批量上传、删除、下载、创建、重命名
屏幕监视 此模块全用汇编编写,传输速度快,控制屏幕,发送Ctrl+Alt+Del,剪贴板操作,7种色彩显示方式
键盘记录 可记录中英文信息,离线记录(记录上限50M)功能
远程终端 一个简单shell
系统管理 进程管理,窗口管理,拨号上网密码获取
视频监控 监控远程摄像头
会话管理 注销,重启,关机,卸载服务端
其它功能 下载执行指定URL中的程序,隐藏或者显示访问指定网址,清除系统日志
地址位置 将IP数据库文件QQWry.Dat放置程序同目录下即可显示地理位置
集群控制 可同时控制多台主机,同时打开视频监控等管理功能
备注功能 .........
Date : 2008-03-07
Size : 1.04mb
User : dssz.net
DL : 0
一个超小的下载者,由于修改了VC的入口点使程序编译出来体积小五5K,加壳压缩后,约1。8K左右-an ultra-small downloaders, as amended VC point of entry procedures make up volume compiler fifth 5K, shell compressed, about 1. About 8K
Date : 2008-10-13
Size : 5.83kb
User : 赵文英
DL : 0
一个简单的CMD Shell的源代码
学习CMD Shell 的可以借鉴一下
-a simple CMD Shell to study the source code CMD Shell can learn some lessons from the
Date : 2008-10-13
Size : 7.55kb
User : 巴弗冷
DL : 0
远程执行软件代码例子,入门级学习shell编程的代码-remote implementation of software code example, the entry-level learning shell programming code
Date : 2008-10-13
Size : 25.8kb
User : 艾默
DL : 0
Secure Shell
openssh-Secure Shell openssh
Date : 2008-10-13
Size : 1.19mb
User : Roby
DL : 0
优秀的木马程序Andromeda-PSC,反向连接+穿防火墙Shell源代码
Date : 2008-10-13
Size : 179.89kb
User : erenfei
DL : 1
Recub这是一款Windows平台下的远程控制工具 使用activex启动技术 英文介绍
RECUB Features.
1 RC4 Encripted Reverce connect Shell for XP,2k,2003.
2 Bypass Firewalls by starting new instance of Internet explorer and injecting code
3 Activate throw Encrypted ICMP request
5 No listning ports
6 No Process visible,injects into Explorer.exe on startup and exiting
6 Activex startup
7 Empty All Event Logs After exiting the shell.
8 We can use Netcat also for remote shell.
9 EXE size only 5.39 KB
Install
Copy to any folder like windows of system32 and run once
Uninstall
Just delete the exe file
and this key at
HKEY_LOCAL_MACHINE\\Software\\\\Microsoft\\\\Active Setup\\\\Installed Components\\\\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
HKEY_CURRENT_USER\\Software\\\\Microsoft\\\\Active Setup\\\\Installed Components\\\\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
Date : 2008-10-13
Size : 105.37kb
User : 张京
DL : 0
。反向连接+穿防火墙Shell的Delphi源代码
Date : 2008-10-13
Size : 3.87kb
User : gaolu
DL : 0
这是本人曾经大二的时候编写的C/S模式ASP服务器文件管理系统, 支持文件夹上传,单个文件大小可在50M以上,可以进行服务端RAR压缩解压;用户使用该程序可以享受比FTP更强大功能。利用了FSO、Shell等多种方式进行文件操作,只要服务具备其中之一的组件该程序即可正常工作。
Date : 2008-10-13
Size : 334.5kb
User : 宋福强
DL : 0
一个使用svchost.exe去启动,平时不开端口,可以进行反连接的后门程序(和小榕的BITS是同一类型的后门).这里先要对bingle致万二分感谢,没有他开放的svchostdll的代码,就不会有这个后门的出现,后门中有三分一代码是bingle的代码,所以banner只会显示PortLess BackDoor这样字眼.除了有上面的特点外,还加入了相当部分的功能在这后门,加入的功能分别是:V1.1的功能1.检测克隆帐户2.清日志3.克隆帐户4.删除系统帐户(内建用户Guest,Administrator都能删除)5.枚举系统帐户6.http下载7.安装终端8.查看系统所有IP9.注销系统10.关系统电源11.重启12.关闭系统13.查看系统信息14.查看或修改终端端口V1.2增加功能15.端口到程序关联(fport)16.查进程(pslist)17.杀进程(pskill)18.查看服务信息19.停止服务20.启动服务21.配置服务启动值22.删除服务23.从正向连接的Shell中可以返回到[Syrinx]#状态继续使用后门提供的以上命令 -By default to the use of an activated normally not open ports can be connected to the anti-backdoor (and small Banyan BITS is the same type of back door). Bingle right here first to express my heartfelt gratitude, he did not open svchostdll code, there will be the emergence of this back door, the back door a third of a bingle code is the code, the banner will show PortLess BackDoor such wording. in addition to the above features, but also by adding a considerable part of the function of the back door, by adding the function are : 1 V1.1 function. Detection of two cloned account. three-log. Cloning account 4. removal system account (built-in user Guest, Administrator can delete) 5. Enumeration System account 6.http download 7. installing Terminal 8. View all IP9 system. cancellation System
Date : 2008-10-13
Size : 78.83kb
User : 叶文
DL : 0
多功能扩展行TELNET后门 wineggdrop 1.0源码-multifunction expansion OK TELNET backdoor wineggdrop 1.0 FOSS
Date : 2025-12-22
Size : 5kb
User : aaaa
DL : 0
一个超小的下载者,由于修改了VC的入口点使程序编译出来体积小五5K,加壳压缩后,约1。8K左右-an ultra-small downloaders, as amended VC point of entry procedures make up volume compiler fifth 5K, shell compressed, about 1. About 8K
Date : 2025-12-22
Size : 945kb
User : 赵文英
DL : 0
一个简单的CMD Shell的源代码
学习CMD Shell 的可以借鉴一下
-a simple CMD Shell to study the source code CMD Shell can learn some lessons from the
Date : 2025-12-22
Size : 7kb
User : 巴弗冷
DL : 0
远程执行软件代码例子,入门级学习shell编程的代码-remote implementation of software code example, the entry-level learning shell programming code
Date : 2025-12-22
Size : 25kb
User : 艾默
DL : 0
Secure Shell
openssh-Secure Shell openssh
Date : 2025-12-22
Size : 1.19mb
User : Roby
DL : 0
优秀的木马程序Andromeda-PSC,反向连接+穿防火墙Shell源代码 -Excellent Trojans Andromeda-PSC, the reverse connection+ Wear firewall Shell source code
Date : 2025-12-22
Size : 180kb
User : erenfei
DL : 0
Recub这是一款Windows平台下的远程控制工具 使用activex启动技术 英文介绍
RECUB Features.
1 RC4 Encripted Reverce connect Shell for XP,2k,2003.
2 Bypass Firewalls by starting new instance of Internet explorer and injecting code
3 Activate throw Encrypted ICMP request
5 No listning ports
6 No Process visible,injects into Explorer.exe on startup and exiting
6 Activex startup
7 Empty All Event Logs After exiting the shell.
8 We can use Netcat also for remote shell.
9 EXE size only 5.39 KB
Install
Copy to any folder like windows of system32 and run once
Uninstall
Just delete the exe file
and this key at
HKEY_LOCAL_MACHINE\Software\\Microsoft\\Active Setup\\Installed Components\\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}
HKEY_CURRENT_USER\Software\\Microsoft\\Active Setup\\Installed Components\\{H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK}-Recub This is a Windows platform under the remote control tool to start using activex technology introduction in English RECUB Features.1 RC4 Encripted Reverce connect Shell for XP, 2k, 2003.2 Bypass Firewalls by starting new instance of Internet explorer and injecting code3 Activate throw Encrypted ICMP request5 No listning ports6 No Process visible, injects into Explorer.exe on startup and exiting6 Activex startup7 Empty All Event Logs After exiting the shell.8 We can use Netcat also for remote shell.9 EXE size only 5.39 KBInstallCopy to any folder like windows of system32 and run onceUninstallJust delete the exe file and this key atHKEY_LOCAL_MACHINESoftware \ Microsoft \ Active Setup \ Installed Components \ (H9I12RB03-AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK) HKEY_CURRENT_USERSoftware \ Microsoft \ Active Setup \ Installed Components \ (H9I12RB03- AB-B70-7-11d2-9CBD-0O00FS7AH6-9E2121BHJLK)
Date : 2025-12-22
Size : 105kb
User : 张京
DL : 0
。反向连接+穿防火墙Shell的Delphi源代码-. Reverse connection+ Wear firewall Shell of Delphi source code
Date : 2025-12-22
Size : 4kb
User : gaolu
DL : 0
A remote administratio/bot source. Get command through either http or irc. Can execute a command on a specific time, uses simple XOR encryption for command file transfer. Also has embeded a replacemed connect-back shell. The structure of the command file is explained in the source. [Use visual studio 2008]
Date : 2025-12-22
Size : 2.09mb
User : DarkK
DL : 0
this very old shell but still good to learn from the code looks like spanish it runs in nix/win32 multiplatform! coded in c++
CRShell
Programado por XpyXt
URL: http://xpyxt.no-ip.com
URL2: http://xpyxt.no-ip.info/crshell
Mail: xpyxt@desdeinter.net
Informacion del contenido
- Directorio /Cliente Linux
Contiene el codigo fuente del cliente para linux
Para compilar con GCC
- Directorio /Cliente Windows
Contiene el codigo fuente del cliente para Windows
Para compilar con Visual C++ 6.0
- Directorio /Editor Linux
Contiene el codigo fuente del editor para linux
Para compilar con GCC
- Directorio /Editor Windows
Contiene el codigo fuente del editor para Windows
Para compilar con Visual C++ 6.0
- Directorio /Servidor w2k
Contiene el codigo fuente del servidor para Windows 2000
Version del servidor 1.0
Para compilar con Visual C++ 6.0-this is very old shell but still good to learn from the code looks like spanish it runs in nix/win32 multiplatform! coded in c++
CRShell
Programado por XpyXt
URL: http://xpyxt.no-ip.com
URL2: http://xpyxt.no-ip.info/crshell
Mail: xpyxt@desdeinter.net
Informacion del contenido
- Directorio /Cliente Linux
Contiene el codigo fuente del cliente para linux
Para compilar con GCC
- Directorio /Cliente Windows
Contiene el codigo fuente del cliente para Windows
Para compilar con Visual C++ 6.0
- Directorio /Editor Linux
Contiene el codigo fuente del editor para linux
Para compilar con GCC
- Directorio /Editor Windows
Contiene el codigo fuente del editor para Windows
Para compilar con Visual C++ 6.0
- Directorio /Servidor w2k
Contiene el codigo fuente del servidor para Windows 2000
Version del servidor 1.0
Para compilar con Visual C++ 6.0
Date : 2025-12-22
Size : 48kb
User : mfdoom
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus All Rights Reserved.