Page of 177
First page | Prev | Next | Last page |

y3k_16

Category: Trojans, Trojans Most Popular, Y3k Trojan

Title: y3k_16 3.16

Format: Win9x/Me/NT/2000

Description: y3 1.6 Y3K Remote Administration Tool Pro is a freeware production by Y3K Network. With this program you can have full control to a computer system.

Download Now



y3k_16_ms

Category: Trojans, Trojans Most Popular, Y3k Trojan

Title: y3k_16_ms 1.6

Format: Win9x/Me/NT/2000

Description: y3 1.6 (megasecurity edition)Y3K Remote Administration Tool Pro is a freeware production by Y3K Network. With this program you can have full control to a computer system.

Download Now



y3k_16_unpacked

Category: Trojans, Trojans Most Popular, Y3k Trojan

Title: y3k_16_unpacked 3.16

Format: Win9x/Me/NT/2000

Description: y3 1.6 (unpacked server)Y3K Remote Administration Tool Pro is a freeware production by Y3K Network. With this program you can have full control to a computer system.

Download Now



UnDetected 3_2

Category: Trojans, Trojans Most Popular, Undetected Trojan

Title: UnDetected 3_2 3.2

Format: Win9x/Me/NT/2000

Description: Undetected is a fully loaded trojan/backdoor, was released by knox as a dedication to mobman and S7 Crew. Is becoming well known as one of the most fully featured trojans available.

Download Now



UnDetected 3_3

Category: Trojans, Trojans Most Popular, Undetected Trojan

Title: UnDetected 3_3 3.3

Format: Win9x/Me/NT/2000

Description: A backdoor is a program that is designed to hide itself inside a target host in order to allow the installing user access to the system at a later time without using normal authorization or vulnerability exploitation. Once installed it allows anyone who knows the listening port number and the password to remotely control the host. Intruders/administrators access the server using the client. The server allows intruders to execute commands, list files, start silent services, steal/recover passwords, upload and download files, manipulate the registry, list windows, take screen shots as well as other options. Undetected can be used as a backdoor or as well as an administration tool. A person who wants to use it must know that in many countries this kind of activity is against the law and that he is the only one responsable for using Undetected (DISCLAIMER).So if you want to respect the law (I suggest to do it) delete the server file RIGHT now and stop using Undetected. How to use it: First you hav

Download Now


First page | Prev | Next | Last page |