Archive Helmet Icon Archive A Reconstructed © MegaSecurity Database

REA

Released 27 years, 9 months ago. July 1998

Copyright © MegaSecurity

By Shital Shah


REA
Informations
Author Shital Shah
Family REA
Category Remote Access
Version REA
Released Date Jul 1998, 27 years, 9 months ago.
Language Delphi (source included)
Additional Information
Server:
size: 266,240 bytes

port: 23145 TCP

startup:
none

Author Information / Description
REA2 - Take The Control 

Concept of trojan horses is not new. Programs like Back Orifice 2000 silently stays
in background in your PC, acts as TCP/IP server and allows somebody to connect it through
Internet and execute commands sent by them. The REA2 (Remote Execution Agent) is my
own trojan horse specifically designed for silent, full proof, reliable and powerfull
illegal intrusion on other people's PCs through Internet. 
Comparing with BO2K, it lacks few features like real time screen display and mouse
control and plug-ins but it's designed to be much more "reliable and silent intrusion"
and currently has few of more capabilities then BO2K.
It's written in Delphi 3.0 to eliminate any runtime requirements. 
The EXE available here is a server. You can use any client that can connect to it on 
port 23145 and send the command strings. My favorite client is my own PortTalk.
I didn't got much time to document these stuff (as usual it was fun program solely meant
for my own use) but you can get the list of commands in TMainForm.ProcessReq function
in main.pas file. This application is right now not in state of easy clicks. 
You might have to modify the source code for your needs.

You can use any client that can connect to it on port 23145 and send the command strings.
My favorite client is my own PortTalk

 Shital Shah

This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.