A set of trojaned files to replace system commands to hide one's presence on a computer system, typically for unix systems, however one for NT exists.

These files are modified copies of the original ones to bypass system logfiles, user processes, disk space usage, file date/time stamps, and much more. These typically come with a trojaned login program that stores all user/passwords to a hidden file somewhere, thus making more of the computer network more vulnerable.