by SpikE
Written in Visual Basic
Released in August 2002
------------------------------- Kryptonic Ghost 1.5 ^The Nightmare is Born^ ------------------------------- *Attention* Virus checkers may pick up KG Commander as a trojan but this is a fault in the virus checker engine as it finds words in the trojan coding which are similiar as the words in the commander so there is actually not a trojan in the commander. Instructions: You will find 3 files in the Kryptonic Ghost package now. KG AV Removal 0.1 (includes Auto invisible file transfer) KG Trojan KG Trojan Commander This is how to use Kryptonic Ghost: Method 1 (sending KG to a victim who has no virus checker) 1. you will need to use the file named KG trojan 2. Change the name of kg trojan to a name ur victim will be fooled by like "my picture" and send this file to a victim of your choice 3. Open up the KG Commander and select the victim who you have just sent the file to. 4. the easy interface lets you do a number of things on the victims computer so get hacking ;) Method 2 (sending KG to a victim who has virus protection) this removes the following virus checkers so far: Norton AV Lan Desk PC Cillin Macafee 1. You will need to use the file named KG AV Removal 0.1 2. like before change its name to something your victim will be fooled by such as "my picture" 3. Send this file to the victim. 4. Now the virus checkers they have hopefully will be deleted 5. Auto invisible file transfer will now be active 6. Now send the file named KG trojan to the victim, you dont have to change its name as the victim wont see it transferring anyway 7. once the file has sent type ** to open KG trojan on the victims comp 8. type ^^ to shut down the virus removal program 9 Use the KG commander's easy new interface to do many things to the victims computer 10. Happy hacking :D SpikE Client: size: 1.232.896 bytes Server: size: 221.184 bytesMegaSecurity