Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

CRSStealth 0.3

Copyright © MegaSecurity

By XpyXt


CRSStealth 0.3
Informations
Author XpyXt
Family CRShell
Category Remote Access
Version CRSStealth 0.3
Language Microsoft Visual C++
Additional Information
Server:
dropped file:


port:  TCP 


tested on Windows XP
May 22, 2006

Author Information / Description
Version 0.3

- Path file with spaces
Paths with blanks must be between quotes.
First path must be between quotes, in the second one it isnt necessary.
#copy "c:\file sux\as.as" c:\or\aasj.as
or
#copy "c:\file sux\as.as" c:\or asd\aasj.as

Use it with every paths which contain blanks

- Jump to another disk drive
#cd d:\

- execute .exe files
You can execute .exe files with the "exec" command
#exec ipconfig.exe
or
#exec "nc -l -vv -p 431"

- Transfer files
You can send files with the command:
#/put <local file> 
Local file of cliente

#/put <local file>
Local file of server


- Uninstall Server

You input command uninstall in to console.


[C:\WINDOWS\system32]#uninstall
Uninstall CRShell Stealth Server
If you can uninstall put command: uninstall now

[C:\WINDOWS\system32]#uninstall now
Procediendo a la desinstalacion...
Uninstall complete.
 You must reboot system now.

[C:\WINDOWS\system32]#

- Commands list:

CRShell Stealt - Help
dir      List directory
cd       Enter in directory
md       Create forlder
rm       Delete folder
copy     Copy file
del      Delete file
move     Move file
exec     Run command or exe
ps       List process
kill     Kill process
type     Read and show file
info     Show information of system
uptime   Show uptime

/rscmd   Spawn cmd.exe
/rsend   End of cmd.exe
/get     Download file
/put     Unload file
/rdll    Call function of dll

wget     Download file form inet

help     Show help

wget suport http and ftp protocol.

XpyXt

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.