Kryptonic Ghost 1.5 (b)
Released 22 years, 3 months ago. August 2002
Copyright © MegaSecurity
By SpikE
Informations
Author | SpikE |
Family | Kryptonic Ghost |
Category | Remote Access |
Version | Kryptonic Ghost 1.5 (b) |
Released Date | Aug 2002, 22 years, 3 months ago. |
Language | Visual Basic |
Additional Information
Client:
size: 1.232.896 bytes
Server:
size: 221.184 bytes
Author Information / Description
-------------------------------
Kryptonic Ghost 1.5
^The Nightmare is Born^
-------------------------------
*Attention*
Virus checkers may pick up KG Commander as a trojan but this is a
fault in the virus checker engine as it finds words in the trojan coding
which are similiar as the words in the commander so there is actually not
a trojan in the commander.
Instructions:
You will find 3 files in the Kryptonic Ghost package now.
KG AV Removal 0.1 (includes Auto invisible file transfer)
KG Trojan
KG Trojan Commander
This is how to use Kryptonic Ghost:
Method 1 (sending KG to a victim who has no virus checker)
1. you will need to use the file named KG trojan
2. Change the name of kg trojan to a name ur victim will be fooled
by like "my picture" and send this file to a victim of your choice
3. Open up the KG Commander and select the victim who you have just
sent the file to.
4. the easy interface lets you do a number of things on the victims computer
so get hacking ;)
Method 2 (sending KG to a victim who has virus protection)
this removes the following virus checkers so far:
Norton AV
Lan Desk
PC Cillin
Macafee
1. You will need to use the file named KG AV Removal 0.1
2. like before change its name to something your victim will be
fooled by such as "my picture"
3. Send this file to the victim.
4. Now the virus checkers they have hopefully will be deleted
5. Auto invisible file transfer will now be active
6. Now send the file named KG trojan to the victim, you dont have
to change its name as the victim wont see it transferring anyway
7. once the file has sent type ** to open KG trojan on the victims comp
8. type ^^ to shut down the virus removal program
9 Use the KG commander's easy new interface to do many things to the
victims computer
10. Happy hacking :D
SpikE
If you recognize any personal information on this page and wish to have it removed or redacted, please contact us at jplesueur@phrozen.io. We are committed to protecting your privacy in accordance with GDPR regulations.