Introduction - If you have any usage issues, please Google them yourself
hide processes, elevate process privileges, fake out the Windows Event Viewer so that forensics is impossible, and even hide device drivers (NEW!) All this without any hooking.
Packet : fu_rootkit.zip filelist
EXE/
EXE/fu.exe
EXE/i386/
EXE/i386/msdirectx.pdb
EXE/ListPrivileges.txt
EXE/msdirectx.nms
EXE/msdirectx.sys
fu/
fu/Debug/
fu/fu.bbs
fu/fu.cpp
fu/fu.dsp
fu/fu.dsw
fu/fu.h
fu/fu.ncb
fu/fu.opt
fu/fu.plg
fu/fu.sln
fu/fu.sln.old
fu/fu.suo
fu/fu.vcproj
fu/fu.vcproj.old
fu/Instdrv.cpp
fu/Instdrv.h
fu/Release/
FU_README.txt
Sys/
Sys/ioctlcmd.h
Sys/MAKEFILE
Sys/objchk_wnet_IA64/
Sys/objchk_wnet_IA64/ia64/
Sys/objfre_wnet_x86/
Sys/objfre_wnet_x86/i386/
Sys/objfre_wxp_x86/
Sys/objfre_wxp_x86/i386/
Sys/ProcessName.c
Sys/ProcessName.h
Sys/Rootkit.c
Sys/Rootkit.h
Sys/SOURCES