
(geeeezzz i wonder why … Could it be that this tool creates viruses? :?) So id suggest turning off your antivirus just while you build the server, and while you send it to ‘people’, because your AV will prevent you from opening the client and will delete any server files you attempt to create. When your antivirus dissembled this file, it containted strings that the antivirus deemed harmful, because it finds these same strings in viruses. Note, you will most likely need to manually kill all the processes associated with your anti-virus in order to successfully terminate it.ĭont be alarmed, this file will not harm you whatsoever. Sometimes the AV will delete the files or tamper with them, so to be on the safe side shut down your AV then re-download or re-extract the files to be sure they are in correct working order.

The client is used to create server.exe files with custom settings which you specify to enable successful connections. There are 2 main components to a trojan, a client (the tool you use to connect to the victim), and the server (the file the the victim runs which enables you to connect to him). They are not your average virus, they give you the power to connect to a ‘victim’ remotely, and do a variety of things. Now before we get into anything too complicated, I would like to explain (very simply) about how trojan horses work.

Filed under: Uncategorized |įirst of all, I would like to say, that this tutorial has been provided for educational use, and that is its sole purpose
