Skip to main content

Sub Seven Trojan Horse

I have created a trojan horse before that looks like a sub seven trojan horse. I did it just for fun. I am wondering if I will share it here. I need your opinion before I upload the source code.

This is for educational purpose only and I am not liable for any damages that this program will cause in your system.

The trojan is a kind of tools use for hacking other computer. Of course I did not use this to penetrate other system.

After you run the server program it will simply reside on your computer and will not do anything until the client program connects and send commands like restarting a computer. It can also open/close cd-rom, open application, log keystroke, delete files, etc. in a remote computer.

I don't know if this can help you or just complicate the situation.

My purpose here is to teach you on how to code and do not have an intention to create a malicious software like this. This is an informational only on how to code a client/server architecture.

Here's the screenshot.

Your comments or suggestions is highly appreciated.

Update: You can access the source code at Trojan - Subseven Alike.

Submitted byAnonymous (not verified)on Sun, 02/01/2009 - 03:06

I think you should upload the source code for  this program.

Submitted byAnonymous (not verified)on Thu, 02/05/2009 - 12:16

In reply to by Anonymous (not verified)

how can i upload the source code fro this program? thank you...

Submitted byAnonymous (not verified)on Tue, 02/03/2009 - 13:30

you should upload it for educational purpose...

Submitted byAnonymous (not verified)on Tue, 02/03/2009 - 18:45

since it is clear that you are not liable for any damges then it is fine with me sir..

i want also to learn about hacking since i don't have yet any idea how to code it.

Submitted byadminon Wed, 02/04/2009 - 10:16

Thanks for the suggestion. I will upload it now.

This makes me wonder if I should be downloading and executing your OCX controls so blithely.

Don't worry the program is safe. The source code is there for you to check. This program is a trojan and will not do anything unless the client program sends a command.

I'm saying that it makes me wonder if your ~other~ programs are safe (like the ocx's with the inventory application). They probably are, but it creates a cloud of suspicion. Something to think about...

Submitted byAnonymous (not verified)on Fri, 02/13/2009 - 15:27

hmm. . do really hav the source code? the screen-shot look like the sub-seven for me

Submitted byAnonymous (not verified)on Tue, 04/07/2009 - 14:06

wow.. i really like this post.. the commetns are great too thanks!!!! No Prescription Needed
Submitted byAnonymous (not verified)on Thu, 11/26/2009 - 18:12

Hi! It's greate project! But ... Are you can migrate this project from VB to VB.NET? If you need help with this work (migration) I can help you
Submitted byadminon Fri, 11/27/2009 - 13:52

In reply to by Anonymous (not verified)

You can start migrating it and I will help you as you go...
Submitted byAnonymous (not verified)on Thu, 11/26/2009 - 18:49

hello, i have a question i would like to ask . I have the subseven trojan ...i dont intend to do anything stupid. I wonna know if i could use the tool to upload a backdoor to a database. if yes, please do let me know.. my email is [email protected]
Submitted byAnonymous (not verified)on Wed, 01/20/2010 - 21:10

Hi I want to know about this how it can affect to other computer and databases through back door.I don't have any purpose to harm other actually I am a student of Engg. 4th yr. Plz send me ur s/w and details about and how to code my id is [email protected] and [email protected]
Submitted byAnonymous (not verified)on Mon, 02/15/2010 - 01:25

sourcecode ,,, c++ , vb or ???
Submitted byAnonymous (not verified)on Fri, 09/24/2010 - 18:08

In reply to by Anonymous (not verified)

Submitted byAnonymous (not verified)on Thu, 03/04/2010 - 11:13

I was wondering if the client had a trojan on it because when i try to put it in my computer my anti virus says its a trojan back door plz help
Submitted byAnonymous (not verified)on Sat, 03/06/2010 - 01:58

GUD DAY! were BSIT student who assigned to create a system specifically enrollment system. we would like to ask help from you regarding on how to connect our program to ms Access using MY SQL connection. Your immediate response is highly appreciatable.. .thank you... just email me: [email protected]
Submitted byAnonymous (not verified)on Thu, 06/10/2010 - 06:02

Dude U know that when a person opens the application it asks you to allow iternet connection to that program(your firewall does this) and it is most probably that an antivirus can easily detect this kind of stuff. If u made it in vb(2008 +) Then use: an ftp server to upload and download strings. This works for me but I dont share my stuff. Try it and U will see that it works everywhere! even on school.. undetectable and its not asking for anything. Good luck.
Submitted byAnonymous (not verified)on Fri, 04/15/2011 - 04:00

In reply to by Anonymous (not verified)

my boyfriend is telling me lies and it feels like its becoming a bit of a cruel game that hes playing on me but i keep trying to tell myself that he isnt lying when he says he loves me but then he turns around and says other things that are not so nice....i know that the right thing for me to do is to break it but its hard because hes the first person i ever let myself love...its hard trusting in people you know?
i suspect he made a new facebook and is using it to talk to another girl but i cant see anything because its all set to private all i see is the name i figured if i could just see it i would be able to walk away from it all
facebook has gotten crazy good at catching hacks so i figured id try his email
i figured the least invasive way to do it is using a trojan keylogger because that way i wouldnt have to change his password on hotmail i would just be able to retrieve it since reseting his password might make problems for him later in accessing his email...i dont want to do anything to hurt anyone i just want to see the truth im at the last points of desparation and obviously if i was sane i would just give up

can you help me??? i dont even need all of the other capabilities or anything cuz im not trying to be malicious i just want to know the truth,even if maybe its just getting that one password?
email me if you can help [email protected]
i cant sleep since i been worrying about this stuff, some peace would be nice thats all im after

Submitted byAnonymous (not verified)on Sat, 08/07/2010 - 00:31

alert('xss by chaster')
Submitted byAnonymous (not verified)on Thu, 08/26/2010 - 02:40

the issue is with VB is that it requires the VB runtimes to execute the application so any other choice please?
Submitted byAnonymous (not verified)on Sun, 09/05/2010 - 19:01

what is trojan ? i don't know
Submitted byAnonymous (not verified)on Wed, 09/15/2010 - 15:21

In reply to by Anonymous (not verified)

trojan is a virus Chutiye
Submitted byAnonymous (not verified)on Fri, 09/24/2010 - 14:35

code also with me!
Submitted byAnonymous (not verified)on Sun, 10/03/2010 - 15:16

i'm a bca 1st yr student....i'm damn interested in hacking and creating virus but in a good way...i've seen many trojans ruinin my comp and i would really love to know in depth as to how it works and its code too.......pls guide me as a teacher...just mail me at [email protected] ....................wil surely get back to u..
Submitted byAnonymous (not verified)on Wed, 12/08/2010 - 15:23

please i realy want to learn to make it in python programing that i know though i know python 50 percent i can help me mess UP WITH THA ANTIVIRUS WORLD

Submitted byAnonymous (not verified)on Wed, 01/12/2011 - 05:18

I am new to VB programming i am using VB 2008 can you refer me to any sites or books that can help me learn it? thanks in advance

Submitted byAnonymous (not verified)on Fri, 03/11/2011 - 22:18

Hey this is Dhananjay from INDIA. Will you please send me ur source come I will send you my Software. my id is [email protected]

Submitted byAnonymous (not verified)on Sat, 05/28/2011 - 20:43

Hello and tired of not ...

I'm Farshad Farzami

Please help if I do the s

I want you ready a trojan that it could automatically log on to their computers and they do it right. Because these programs do not always difficult and I can not control their computers from afar I

The program must write and send to my email

Thank you very much

my E-mail : [email protected]

Submitted byAnonymous (not verified)on Fri, 06/17/2011 - 16:26

please send source code to me, i will enhance and upload back using delphi

[email protected]

Add new comment

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.