I have a project, a fully functional Trojan, that can give you access to webcam, microphone, explorer, keylogging... simply Full control over the target computer... it uses a smart technique to avoid detection and it is completely FUD. if you are interested in this kind of projects please pm me.