Here are the Instructions
Use Social Engineering to Manipulate the backdoor file and make the target download it.
Use the compiled Server.c file on your system to then access target's system
👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.
CMIT