top of page

Student Group

Public·241 members
Ezekiel Turner
Ezekiel Turner

Senna Spy One Exe Maker 2000 2.0



Version 0.01of this simple Russian virus maker was released with issue #4 of the DVL e-zine. It is a CLI operated generator that creates batch viruses through a user configurable .CFG file. Version 0.02d was released with issue #6 of the DVL e-zine and is based on a Word 97 template and also creates batch viruses.They were created by the author of DPOG, DPVG, CTMWVCK and DVL. A hacked version of release 0.02d of this kit is known as MSCC.




Senna Spy One Exe Maker 2000 2.0


Download Zip: https://www.google.com/url?q=https%3A%2F%2Furluso.com%2F2tU5gT&sa=D&sntz=1&usg=AOvVaw1wwjNraUiIkfKmQ81FpPZd



Created during the "I Love You" virus/worm hype this kit creates VBS script worms for Windows Scripting Host (WSH). An early version was named "Evolution". This kit is similar to the Windows Scripting Host Virus Generator, The Simple WinScript Virus Kit and Senna Spy Internet Worm Generator 2000 (SSIWG).


VBSWG 0.01 - June 2000 VBSWG 0.80 - July 2000 VBSWG 0.90 - July 2000 VBSWG 0.91 - July 2000 VBSWG 0.95 - July 2000 VBSWG 1.00 - July 2000 VBSWG 1.10 - July 2000 VBSWG 1.50 - July 2000 VBSWG 1.50b - August 2000


Author's note: "The Virus Creation 2000 System (VC2000), is a virus creator designed for complex code generation, great configurability, and ease of use. There is only one file that you need, VC2000.EXE (which is presently under 22k). After asking you a series of questions, it will then create a MASM/TASM compatible assembly source code of your virus, along with a "MAKEVIR.BAT" which helps speed things along a bit. Another great option, is the virus detector, which you can custom configure. This will trap an interrupt, and when the virus calls the interrupt with DX equaling what you set it for, it will warn you and give you an option to halt the program." Version 0.97 comes with one virus and a VC2000 detector. The produced code does not contain any activation routines.


Late in summer 1992 the next virus toolkit software was published: the Virus Creation Laboratory or VCL. Behind VCL stands the Nowhere Man, a member of the American group of virus writers, NuKE. VCL is quite a remarkable product: it features a colorful graphical interface of nearly commercial quality with mouse control and drop-down menus, it is installed with a separate installation program and it is supplied with quite accurate and well-written documentation. VCL also contains the ICO and PIF files, with which it can be handily installed in the Windows Program Manager. It is possible to easily create several different kinds of viruses with VCL. From the menus one can choose between a COM file -infecting, a companion virus or an overwriting one. In addition to those, Trojan Horses and Logical Bombs can also be made with VCL. The Virus Creation Laboratory is an application of considerable versatility. By using it, it is possible to define exact activation conditions for a virus made with it, those being, for example, the date, time of the day, the number of infected files, a computer's country code, the version of DOS or the amount of available RAM. VCL presents many alternatives for the activation routine of a virus or a Trojan Horse. Selections mentioned on the menu are crashing the computer, a corruption of files, the printing of a freely chosen text on the screen or printer, the overwriting of whole disks and the playing of a music sample that can be freely composed. In addition to this, the user can add routines to the program's menu. When a user has chosen the desired options, VCL creates the assembler-language source code of a virus or a Trojan Horse on the disk. The user can, if he so wishes, edit it still further before compiling it into an executable form. Despite its great versatility, VCL has not become very popular among virus hobbyists. There are many reasons for this, but the most important probably is that the majority of anti-virus programs were able to find almost all the viruses made by VCL soon after it had been published. In fact, F-PROT recognized most of them even before VCL had been analyzed at all. The functionality of VCL at the hands of virus tinkers is further reduced by the fact that it occasionally makes viruses that do not work at all - most of the source codes it creates cannot even be compiled with an assembler compiler. The Nowhere Man has, however, announced that he is working on a new version of the program - a possible VCL for Windows is also speculated in the documentation of VCL 1.0. There are many interesting details to be found in the extensive documentation of VCL. Among other things, the Nowhere Man forbids the makers of anti-virus software from extracting search character strings from VCL or the viruses made by it. The initial package came with 8 viruses made with VCL and by now numerous viruses made with VCL are roaming the VX-boards. In April 1994 Firecracker (then NuKE) released his VCL Mutator intended to make VCL viruses unscannable again.


Author's quote: "YOFVG is a simple virus hacking kit, much like VCS (the very first virus maker) and VKit100 (allows you to make a windows virus). It took about an hour to write, including the virus code, and it was written in quickbasic. :


Google hacking. Google Hacking, also named Google Dorking, is a computer hacking technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites use.007 Password Recovery.exe187 Final.exe5SKINNT.EXE95SSCRK.EXEserver.exeINIT.EXEa3i.exeabelkiller.exeAbsoluteTelnet.exeAccessPassword.exeAchilles.exeAckCmdC.exeAckCmdS.exead_aware.exeADIG.EXEadjustcr.exeAdonAi02.exeAdsubtract Se.exeAdvanced Zip Password Recovery.exeAenima.exeaf7.exeAG.exeAim Crack.exeAiM Options.exeAIM Pass.exeAim Shield.exeaim spam.exeAIM Utopia 2.0.exeaimpwd.exeAimPws.exeAllGonefull21T.EXEAmi Bios Dekoder.exeAnalogx Port Blocker.exeANONMAIL.EXEantibooter.exeAntiLock.exeAntiSpector.exearpinject.exeArpworks.exeAss Sniffer.exeAssimilation.ExeAt Home Speed Patch.exeAttacker.exeau2pong.exeAutoRespond.exeAvalanche.exeAward Bios Cracker.exeAuth Bypass 99.exeAVIRIP.EXEBack Orifice 2000.EXEBandwidth Meter 2001.exeBanshee Screamer.exeBarrio.exeBatch Editor.exebconv.exeBeatLm.exeBEER.EXEBeware Of Dog.exeBind.EXEBioNet.exebionix.exeBISSE.exeBitchX75p2-6.exeblast.exeBlinD.exeBlood Lust.exebloodhound 2.0.0 setup.exeBlueFire2.5.exebmb2.exebof_ocxs.exeBOMB.EXEBomba.exeBomber.exeBomsquad.exeboomcrack.exeBound File Detector.exeBoxScanner.exeBrutus b2.exeBuschtrommel.exeBUTTSniff.exeByte 4 Byte.exeBMP2TXT.EXEboping.exeBSM14.exeCain And Abel NT.exeCain And Abel.exeCanary.exeCcbill Local Cgi Exploiter.exeCHA0SCAN.EXEChanPro.exeChkLock.exeCHNTPW.EXEClassic Idle III.ExeCleareventlog.execlick4.exeClient 1.3.exeClient13a.exeClient_controller.exeClone Lab.exeseaport.exe - Step-by-Step Guide Ho...Please enable JavaScript


.96mm 1.03.96mm 2.1.97mm 3.222Spy4u666 de Troie 1.0666 deTroie711 beta 196mm96mm 1.03A-311 DeathA-311 Death 1.00.AA-311 Death 1.02A-311 Death 1.03A4Zeta Beta 1Acid Battery 1.00Acid Head 1.00Acid KorAcid ReignAcid Reign 2.0Acid Shiver Release 5.00 (Public Open Source)Acid ShiversAcid Shivers eAcid Trojan HorseAcid Trojan Horse 1.1Acid Trojan Horse 1.1bAcidsenaAck CmdAckCmdAcropolis 1.0ActiveXExambleAdminTool 2.0Adrem Free Remote ConsoleAdvanced Remote InfoAdvertiser BotAeon 1.0Agent40421AggressorAHSAibolit 4.0AIMasterAIMVisionAIMVision 1.03AIMVision 1.04AIMVision 1.4AIRAircop.bAircop.cAkoschAkosh 4AladinoAl-BarekiAlerterAlexMessoMalex TrojanAlexMessoMalex Trojan 1.0AlexMessoMalex Trojan b2AlexMessoMalex Trojan b2.2AliciaAlicia.bAlicia.IAlien Hacker 2.5Alien SpyAlmasterAlphaAlphaDogAlpsAlvgusAlvgus 8.0Alvgus Trojan 2000Amanda 2.0Ambush 1.0AmitisAmitis 1.1Amitis 1.2Amitis 1.3Amitis 1.4AMSAnal FTPAnal Rape 1.0aAndromeda RATANew TrojanAnnoy ToysAntesAnti-DenialAntiLamer BackdoorAntiLamer Backdoor 1.0AntiLamer Backdoor 1.1AntiLamer Backdoor 1.2AntiLamer Backdoor 1.3AntiLamer Backdoor 1.4AntiLamer Backdoor 1.4bAntiLamer Backdoor 2.0AntiLamer Backdoor 2.0.fAntiLamer Backdoor 2.01AntiLamer Backdoor 2.0mAntiLamer LightAntiLamer Light 1.0AntiLamer Light 1.1AntiLamer Light 2.01AntiLamer Light 2.1Anti-MSNAny Place ControlAOL AdminAOL Admin 1.1APRE 1.0AquaAqua 0.0.1Aqua 0.2Aqua ClientArab.834Arara.1038ArcanumArcticArctic Warfare Device 1.3ArmageddonArmageddon 2Armageddon.1074Armageddon.1079ArsdArticArtic 0.6bArturik 1.0Asassin 1.0 PatchAshAsh.280.aAsh.712Ash.737Ash.743.aAsh.Pizza.1602Ash.Pizza.1604Ash.RiotAsh.Riot.449Ash.Riot.451AshleyAshley 1.01Ashley 1.1.0AsmPhoto TrojanASP RootKit 1.0Asp.472.aASpamASpam.AmcisASpam.DrvmanAsS4Ss1n Beginner RATAssassinAssassin 1.0Assassin 1.1Assassin 2.0 PubAssassin 2.0b 1.0Assassin 2.0cAssassin's Beginner RATAstra_II.1010AsylumAsylum 0.1Asylum 0.1.1Asylum 0.1.2Asylum 0.13Asylum 0.14A-TrojanA-Trojan 2.0Attache InstallAttention.394.aAtwindaAudioDoorAudioDoor 1.2bAugust10AutocratAutocrat 1.06.0058Autocrat 1.21.36Autocrat 1.26.0.59Autocrat 1.26.60AutospyAutospy 1.0Autospy 1.1Autospy 1.2Autospy 1.2.2Autospy 1.3Autospy 1.4AvanzadoAvone 2 betaAyamAyan Bilisim 0.1B.F. EvolutionB.F. Evolution 5.3.1.2Back AttackBack Attack 1.3Back Attack 1.4Back Attack 1.5Back Attack 1.6Back Attack 1.7Back Attack 1.8Back Attack 1.9Back Attack 2.0Back ConstructionBack Construction 1.2Back Construction 1.5Back Construction 2.1Back Construction 2.5Back EndBack End 5Back End 6Back OrificeBack Orifice 1.20Back Orifice 1.3Back Orifice 1.41Back Orifice 2000Back Orifice 2000 1.0 InternationalBack Orifice 2000 1.1Back Orifice 2000 1.1.1Back Orifice 2000 1.1.2Back Orifice 2000 1.3 beta 1Back Orifice 2000 1.3 beta 1aBack Orifice 2000 1.3 beta 4.1Back Orifice 2000 1.3 pre 1Back Orifice 2000 1.3 pre 10Back Orifice 2000 1.3 pre 2Back Orifice 2000 1.3 pre 3Back Orifice 2000 1.3 pre 4Back Orifice 2000 1.3 pre 5Back Orifice 2000 1.3 pre 6Back Orifice 2000 1.3 pre 7Back Orifice 2000 1.3 pre 8Back Orifice 2000 1.3 pre 8aBack Orifice 2000 1.3 pre 9Back Orifice 2000 AnalyzerBack Orifice 2000 CVS 000Back Orifice 2000 CVS 001Back Orifice 2000 CVS 002Back Orifice 2000 CVS 003Back Orifice 2000 CVS 004Back Orifice 2000 CVS 005Back Orifice 2000 Password Scanning PluginBack Orifice 2000 SDKBack Orifice 3 DESBack Orifice FTP PluginBack Orifice Java 1.0Back Orifice Unix 1.21Back Streets 1.5BackageBackage 3.0Backage 3.0.1Backage 3.1 New Backdoor AgeBackage 3.2 SEBackage Server 3.1aBackdoorBackdoor 1.xBackdoor 2.00Backdoor 2.01Backdoor 2.02Backdoor 2.03Backdoor 2.1Backdoor AAG.ABackdoor ChampionBackDoor GaloreBackdoor.AlexBackdoor.AliciaBackdoor.Alicia.cBackdoor.Alicia.dBackdoor.Alicia.eBackdoor.Alicia.fBackdoor.Alicia.hBackdoor.Alicia.iBackdoor.Alicia.jBackdoor.Alicia.kBackdoor.Alicia.lBackdoor.Alicia.mBackdoor.Alicia.nBackdoor.Alicia.oBackdoor.AlienBackdoor.AshleyBackdoor.Ashley.100Backdoor.Ashley.100.bBackdoor.Ashley.100.dBackdoor.Ashley.101.aBackdoor.Ashley.110Backdoor.Ashley.110.aBackdoor.Ashley.110.bBackdoor.Ashley.110.cBackdoor.AsylumBackdoor.Asylum 0.13.bBackdoor.Asylum.011Backdoor.Asylum.013Backdoor.Asylum.013.cBackdoor.Asylum.013.eBackdoor.Asylum.Web.cBackdoor.AugudorBackdoor.Augudor.aBackdoor.Augudor.bBackdoor.Augudor.cBackdoor.Augudor.dBackdoor.BeastDoorBackdoor.BeastDoor.17Backdoor.BeastDoor.18.dBackdoor.BeastDoor.201.aBackdoor.BeastDoor.201.bBackdoor.BeastDoor.202.aBackdoor.BeastDoor.202.bBackdoor.BeastDoor.205Backdoor.BeastDoor.206.aBackdoor.BeastDoor.206.bBackdoor.Belio.09Backdoor.BlackIceBackdoor.BO2KBackdoor.BO2K.09.bBackdoor.BO2K.10Backdoor.BO2K.13.aBackdoor.BO2K.bBackdoor.BO2K.lBackdoor.BO2K.plugin.Aes.bBackdoor.BO2K.plugin.BlowFishBackdoor.BO2K.plugin.BlowFish.aBackdoor.BO2K.plugin.BlowFish.bBackdoor.BO2K.plugin.bopeep.bBackdoor.BO2K.plugin.rcgi.112Backdoor.BoilingBackdoor.Cigivip.15.bBackdoor.CmjSpyBackdoor.CmjSpy.10Backdoor.CmjSpy.13.bBackdoor.CmjSpy.161Backdoor.CmjSpy.21.dBackdoor.CmjSpy.22.aBackdoor.CmjSpy.23Backdoor.CmjSpy.25.bBackdoor.CmjSpy.25cBackdoor.CmjSpy.dBackdoor.CmjSpy.gBackdoor.CmjSpy.hBackdoor.CmjSpy.iBackdoor.CmjSpy.lBackdoor.CmjSpy.nBackdoor.CmjSpy.oBackdoor.CmjSpy.pBackdoor.CmjSpy.qBackdoor.CmjSpy.rBackdoor.CmjSpy.sBackdoor.CmjSpy.tBackdoor.CrackerDoorBackdoor.CrashCoolBackdoor.CrashCool.aBackdoor.CrashCool.bBackdoor.CrashCool.cBackdoor.CrashCool.dBackdoor.CrashCool.eBackdoor.DanielBackdoor.DarksunBackdoor.DiabloBackdoor.DiabloKeys.22Backdoor.DragonIrcBackdoor.DragonIrc.aBackdoor.DragonIrc.cBackdoor.DSNX.04Backdoor.DTrBackdoor.DTr 1.0Backdoor.DTr 1.4.4iBackdoor.DTr.14.bBackdoor.DTr.14.cBackdoor.DTr.142.bBackdoor.DTr.144.dBackdoor.Fatcon.20Backdoor.FeapBackdoor.FubotBackdoor.GF.13xBackdoor.Goh.01Backdoor.GrayBirdBackdoor.GrayBird.eBackdoor.GrayBird.gBackdoor.GrayBird.kBackdoor.GrayBird.lBackdoor.GrayBird.mBackdoor.GrayBird.nBackdoor.Hackdef.084Backdoor.HackTackBackdoor.HttservBackdoor.HupigeonBackdoor.Hupigon.bBackdoor.IcmpCmd.10Backdoor.IdimdoorBackdoor.ImortBackdoor.InternalBackdoor.Intruder.10.dBackdoor.IRC.ContactBackdoor.IRC.FinalBackdoor.IRC.katBackdoor.IRC.mIRC-basedBackdoor.IRC.Sdbot.05.cBackDoor.JZBackdoor.Latinus.14Backdoor.LeveloneBackdoor.Levelone.aBackdoor.Levelone.bBackdoor.Levelone.cBackdoor.Levelone.dBackdoor.LongviBackdoor.NeolBackdoor.NetbusBackdoor.Netbus.12Backdoor.Netbus.20.dBackdoor.Netbus.drBackdoor.NetControl.30.cBackdoor.NetDevil.12Backdoor.NetSpy_II.05.aBackdoor.NMKBBackdoor.OblivionBackdoor.Oblivion.01Backdoor.Oblivion.01.aBackdoor.Oblivion.011Backdoor.OhpassBackdoor.PasanaBackdoor.PcControl.21Backdoor.PingBackdoor.Ping.BBackdoor.Ping.CBackdoor.Ping.EBackdoor.PorkodioBackdoor.ProphetBackdoor.Prowler.20Backdoor.Ptakks.217Backdoor.Ptakks.drBackdoor.Ptakks.XP.eBackdoor.PvtBeastBackdoor.RedHors.01Backdoor.RemoteControl.aBackdoor.Rosyba.cBackdoor.RSCdoorBackdoor.RSCdoor.10Backdoor.RSCdoor.11Backdoor.ServuDoor.aBackdoor.ShiverBackdoor.SlackbotBackdoor.Slackbot.aBackdoor.Slackbot.bBackdoor.SociaBackdoor.Subseven.10.bBackdoor.Subseven.16Backdoor.SubSeven.17Backdoor.Subseven.19.dBackdoor.SubSeven.20Backdoor.SubSeven.21Backdoor.Subseven.21.eBackdoor.SubSeven.21.fBackdoor.SubSeven.21.gBackdoor.SubSeven.21.Muie.aBackdoor.SubSeven.213.bonusBackdoor.SubSeven.22.aBackdoor.SubSeven.22.pluginBackdoor.SubSeven.chirisBackdoor.Subseven.ICQPassBackdoor.Subseven.Javaclient.3Backdoor.Subseven.Javaclient.Commands.ABackdoor.Subseven.Javaclient.FrameBackdoor.SubSeven.pacBackdoor.SysinstBackdoor.SystemDebugBackdoor.SystrayBackdoor.TasmerBackdoor.Tasmer.bBackdoor.Tasmer.cBackdoor.TDS.SE.33Backdoor.TerminalBackdoor.thcBackdoor.Theef.123Backdoor.Troj2kBackdoor.TRPBackdoor.Undernet.bBackdoor.URCSBackdoor.URCS.103Backdoor.URCS.105Backdoor.VCBackdoor.VeritalBackdoor.XQdoor.09Backdoor.Y2KCountBackdoor.Y3KRat.16Backdoor.ZhangBackdoor/Coma.ServerBackdoor/GirlFriend 1.2 ServerBackdoor/HackTack.14.ServerBackdoor/HBR.10.ServerBackLashBackLash 1.01 ABackSocketBackSocket 5.0BackSocket 5.6Backstabb LiteBackTrapBackWindows 1.0BadBOTBalistix 1.0BarbareBarbieBarisotBaron NightBaron Night 1.0Baron Night 2.0Basic Hell 1.0BBNT (Big Brother NT) 1.04BCBDDTBDirect 1.0Bear & Tiger 1.0BeastBeast 1.7Beast 1.8Beast 1.8bBeast 1.8dBeast 1.90Beast 1.91Beast 1.92Beast 2.00Beast 2.01Beast 2.02Beast 2.06Beast PatchBedienks.224BeeOneBelio 0.09BestPicsBeta Server 1.7BF Telnet DemoBFGhost 1.0Big BrotherBig Brother 3.5.1BigGluckBigorna 1.0Bigshot 1.0BionetBionet 0.84Bionet 0.87Bionet 0.871Bionet 0.92Bionet 2.10.1bBionet 2.2.1Bionet 2.2.xaBionet 2.61Bionet 2.8.1aBionet 2.9.1bBionet 3.02Bionet 3.04Bionet 3.05Bionet 3.06Bionet 3.07Bionet 3.08Bionet 3.09Bionet 3.10xBionet 3.11xBionet 3.12Bionet 3.13Bionet 3.14Bionet 3.15Bionet 3.16Bionet 3.17Bionet 3.18Bionet 3.19bBionet 4.00.03Bionet 4.01Bionet 4.02Bionet 4.03Bionet 4.04Bionet 4.05Bionet CGI Logger 1.0Bionet Lite 1.0Bionet Lite 1.4Bionet SDKBirdSpy 3.0BitarBitch ControllerBitch Controller 2.05BLABla 1.0Bla 1.1Bla 2.0Bla 4.0Bla 5.01Bla 5.03Black AngelBlack Angel 1.3Black Angel b5Black DiverBlack Diver 0.98Black DreamBlack Dream 1.0BlackCore 1.0BlackCore 1.1BlackCore 1.2.1BlackHoleBlackhole 2000Blackhole 2002 g xBlackHole TrojanBlackIce TrojanBlackShade 1.0Blade RunnerBlade Runner 0.80ABladorBlakharazBlakharaz 1.0Blazer 5Bleem-BBless 0.01BLHouseBlue AdeptzBlue Ice 2000 CBlueAngelBlueAngel 0.1BlueAngel bBlueWaterBO CAST-256BO FreezeBO Freeze 1.20Bo Freeze 1.20.0200BO Sniffer v1.2BO Unix 1.2.1BO.Client.Facil.BBO2KBO2K IDEA EncryptionBO2K IDEA Encryption 0.2BO2K IDEA Encryption 2.0BoBoBO-BOBO-BO 1.0bBOC 1.1BOClientBOClient 1.3bBOClient 1.4BOClient 1.41BoFacilBoFacil 1.2BogtkBoilingBoPeepBOred The Windows Dumb-Terminal PluginBoScriptBoScript 0.1BoScript 0.2Boss Eye 1.0Botao 1.0BOTool 1.0BouffetroyenBOWhackBowlBrainSpyBrainSpy BetaBrat TrojanBreachBreach 2001 b17Breach 4.5bBreach Pro 1.0Breach Prowler 2.0Breath of DeathBreath of Death 1.0BroomopBroomop 1.2Broomop 1.3Brown Orifice HTTPDB-S SpyB-S Spy 1.90B-S Spy 1.91BSDi BackdoorBSDI ClientBSE TrojanBubbelBubbel 1.0BububuBugmaster Telnet RATBugs C/S TrojanBus ConquererBus Conquerer 1.2Bus Conquerer 1.3Buschtromme


About

Welcome to the group! You can connect with other members, ge...

Members

bottom of page