A set of software tools used by a third party to gain unauthorized access to a computer system and control the system while concealing itself from the user.