Python implementation of the whole tricky, Trojan and other hacker software!

Source: Internet
Author: User

Consider using Python to make a tricky, Trojan software, I provide ideas. (It's clear to people who have never learned programming)

1, first a hacker to do a tricky or Trojan software, will not let you can close it.

2, the inside often will be accompanied by the method of deception.

3, finally achieve a certain purpose.

A period of time in the vibrato to see an interesting program, it appears that VB is written, the first thing to use the method of deception, the use of software name deception target Click Software, opened after a label, two buttons.

The label says: I love you, do you love me?

Button: A Write love, one is not love.

What to do? The average person sees this as a direct fork off the software. However, the programmer has already written in the code window closed = False.

So there is no way, click a button to see, when the target point does not love _ button when the point is not in the mouse movement at the same time, the button is also moving. is how you can not point it, because others call the module to write the button coordinates follow the mouse movement.

No way, click on the button of love, anyway, no one knows I ordered. Well, maybe you can meet good people, you're the object. Click on the Love _ button will appear window destruction. Some people specialize in tricky, click the Love _ button immediately pop-up message box = "You are fooled Again", immediately the computer will appear the Shutdown interface (of course you can add alarm clock delay what). Someone else wrote the code that triggered the shutdown on the button.

Such a way of thinking, I have written in Python yesterday, of course, the tricky type. If you want to play a Trojan horse is not not can not, need to play some ideas, but you play is your business, I share the programming knowledge only for legitimate reference learning.

Is it nearly what? Yes, some people will open Task Manager and click the close process. So, we're going to write a Python daemon.

A Python service program starts at the command line and is controlled by the terminal (Task Manager) as a child of the terminal. If you close the sub-program for the terminal, the Python program will also close.

If you want your Python program to be unaffected by the terminal, you must turn it into a daemon.

Python implementation daemon is very simple,

Python Daemon Code:

To write the steps:

Why Fork two times?

File descriptor

Linux is "All Files", and file descriptors are indexes created by the kernel for files that have already been opened, typically non-negative integers. The process performs IO operations through file descriptors.

Umask Permission Mask

In a Linux system, any file has three usage rights for read, write, and execute (execute).

For example 754:

But Umask is in order to control the default permissions, to prevent the new file Alive folder has full authority.

Process Group

Conversation Group

The session mechanism requires shell support for work control, so the Bourne shell does not support session mechanisms.

Daemons and daemon processes

So Python daemon, for Trojan production, software and other uses is very important, of course, I do not support for illegal use, but can be used for commercial purposes, not blackmail ...

Python implementation of the whole tricky, Trojan and other hacker software!

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.