Archive A Reconstructed © MegaSecurity Database
AIM Evil Doer
Copyright © MegaSecurity
Informations
| Family | AIM Evil Doer |
| Category | Information Stealer |
| Version | AIM Evil Doer |
| Language | Visulal Basic |
Additional Information
Server:
port: 80 TCP
Author Information / Description
***HOW TO USE***
1) Open AIM Evil Doer Editor.
2) Enter your IP in the top text box and enter the port in which you will
be listening on for passwords.
3) Click the 'Save' button.
4) Close AIM Evil Doer Editor and send Prynceton Multi-Tool to your victim
along with prynceton.dll. (The file is shown to them as a program that lets
them either generate passwords or go to certain sites including the site
where you can get a working AIM booter. You will probably have to tell them
what it is before they'll accept so that's what you should say)
5) Open AIM Evil Doer Main and listen on the port which you speficied in step 2.
6) Wait for their passwords.
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.