Archive A Reconstructed © MegaSecurity Database
RedShell
Released 22 years, 4 months ago. December 2003
Copyright © MegaSecurity
By RedStar
Informations
| Author | RedStar |
| Family | RedShell |
| Category | Remote Access |
| Version | RedShell |
| Released Date | Dec 2003, 22 years, 4 months ago. |
Additional Information
Server:
size: 15.360 bytes
port: 1337 TCP
Author Information / Description
***************************************************************************
RedShell V1.0
By RedStar
***************************************************************************
RedShell is a light (15k) backdoor that is capable of spawning a shell on a
remote computer, allowing a user the ability to connect
(via Telnet, NC. etc) up to the remote computer, [port 1337],
and execute any commands they wish.
Installation:
Put WINSYS32.EXE into the Windows/System32 folder of your victims computer
and execute.
Uninstallation:
Kill the WINSYS32.EXE process, Delete WINSYS32.EXE from the
Windows/System32 folder and to remove the service, start Regedit and
delete:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WINSYS32
RedStar
This archive is an almost-complete reconstruction of the legendary Mega Security (also known as Kobayashi), a premier 90s-era "Trojan Database" where malware authors once showcased their work. After a decade offline, the site was brought back in August 2024 by its original creator, MasterRat, who authorized the Malware Gallery to host this modernized, searchable version of the collection. While the original site remains available for those seeking a nostalgic, old-school experience, we are proud to continue its legacy here. Full credit and thanks go to MasterRat and the retired Mega Security staff for their years of dedicated work in cataloging these historical samples.