List of the most known backdoors and the ports they use. It has 130 different trojans and more than 150 ports listed.
c0ca6e5af2ea2bc12bb290309372e81c364d8109c1d25218f4e4c52443f89292
White paper discussing Windows trojans. Written for newbie home PC users.
33f7db9373b30ae302e7ee598301369005f836114516b5f2ed62e23b3a46a86a
An analysis of the Klez worm listing all the steps that it takes.
f2c65ec510c5523d748d5d277a63219df67263954663d1d20fdfc5ad9b1abcfc
This paper explains a technique of cracking any kind of raw encryption using word patterns, without the conventional key combination trying.
dce740abf0c17e037fbd17ff6fb1e118ffc53ede465268b5bbfa137c109d6cc4
White paper explaining how to try and bypass detection from antivirus software by recompiling the same code with a few minor changes.
ed996b12d0f2df8baf46b0eb9266cbde4f7134bafe3dd50cd775fe7dd5ff08c9
skl0g is a simple and compact keylogger for Windows. It runs invisibly and effectively. It logs everything that is typed at the computer and saves them in log files according to the date.
17c563fff95bddddea1a4b94071044a54181dfeb472a96552590df349f6134ad