Search the Community

Showing results for tags 'rat'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Staff Control
    • Staff Announcements
    • Moderators
    • Administration
  • General doubts | News
    • General doubts
    • News
  • Hacking | Remote Administration | Bugs & Exploits
    • Hacking
    • Remote Administration
    • Bugs & Exploits
  • Programming | Web | SEO | Prefabricated applications
    • General Programming
    • Web Programming
    • Prefabricated Applications
    • SEO
  • Cracking Zone
  • Security & Anonymity
  • Operating Systems | Hardware | Programs
  • Graphic Design
  • vBCms Comments
  • live stream tv
  • Marketplace
  • Premium Accounts
  • Modders Section
  • PRIV8-Section
  • Cracking Zone PRIV8
  • Carding Zone PRIV8

Blogs

There are no results to display.

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


Location


Interests


Occupation


TeamViewer


Twitter


Facebook


Youtube


Google+


Tox

Found 94 results

  1. RAT-via-Telegram Windows Remote Administration Tool via Telegram (now in Python 3.7!) | Originally created by Ritiek Why another one? The current Remote Administration Tools in the market face 2 major problems: Lack of encryption. Require port forwarding in order to control from hundreds of miles. This RAT overcomes both these issues by using the Telegram bot API. Fully encrypted. The data being exchanged cannot be spied upon using MITM tools. Telegram messenger app provides a simple way to communicate to the target without configuring port forward before hand on the target. Features: Keylogger with window title log included Get target PC's Windows version, processor and more Get target PC's IP address information and approximate location on map Delete, Move files Show current directory Change current directory List current or specified directory Download any file from the target Upload local files to the target. Send your image, pdf, exe or anything as file to the Telegram bot Autostart playing a video in fullscreen and no controls for a youtube video on target Take Screenshots Execute any file Access to microphone Start HTTP Proxy Server Freeze target's keyboard Schedule tasks to run at specified datetime Encode/Decode all local files Ping targets Update .exe -- thanks LearnerZone Self-Destruct RAT Change wallpaper from file or url Execute cmd shell Take snapshots from the webcam (if attached) Execute arbitrary python 3.7 on the go Freeze target's mouse [TODO] Browser (IE, Firefox, Chrome) cookies retrieval [TODO] Password retrieval [TODO] Monitor web traffic (graphically?) [TODO] Bandwidth monitoring (stepping stone to web traffic monitoring) - started 28/10/2018 [TODO] Fine-tuning scripting (i.e.: if app x is opened y is executed) [TODO] Capture clipboard (Text, Image) [TODO] Hide desktop icons [TODO] Audio compression [TODO] Name server lookup (/nslookup - #19) Thanks Dviros: Chrome login/password retrieval Display ARP table Get active processes and services Shutdown/Reboot computer Display DNS Cache & More coming soon! Screenshots: Installation & Usage: Clone this repository. Set up a new Telegram bot talking to the BotFather. Copy this token and replace it in the beginning of the script. Install the dependencies: pip install -r requirements.txt. Install PyHook and PyAudio 64-bit or 32-bit depending on your system from lfd.uci.edu To run the script: python RATAttack.py. Find your bot on telegram and send some command to the bot to test it. To restrict the bot so that it responds only to you, note down your chat_id from the console and replace it in the script and comment out the line return True. Don't worry, you'll know when you read the comments in the script. - A folder named `RATAttack` will be created in your working directory containing `keylogs.txt` and any files you upload to the bot. Deploy quickly: Clone the repo Create a bot with BotFather and save the token Go into RATAttack.py and replace tokenwith the token you saved Run setup_rat.py Commands: When using the below commands; use / as a prefix. For example: /pc_info. arp - display arp table capture_pc - screenshot PC cmd_exec - execute shell command cp - copy files cd - change current directory delete - delete a file/folder download - download file from target decode_all - decode ALL encoded local files dns - display DNS Cache encode_all - encode ALL local files freeze_keyboard - enable keyboard freeze unfreeze_keyboard - disable keyboard freeze get_chrome - Get Google Chrome's login/passwords hear - record microphone ip_info - via ipinfo.io keylogs - get keylogs ls - list contents of current or specified directory msg_box - display message box with text mv - move files pc_info - PC information ping - makes sure target is up play - plays a youtube video proxy - opens a proxy server pwd - show current directory python_exec - interpret python reboot - reboot computer run - run a file schedule - schedule a command to run at specific time self_destruct - destroy all traces shutdown - shutdown computer tasklist - display services and processes running to - select targets by it's name update - update executable wallpaper - change wallpaper You can copy the above to update your command list via BotFather so you don't have to type them manually. Compiling: How To Compile: Either: Replace your path in compileAndRun.bat (running this will actually run the executable) Or: Run `pyinstaller --onefile --noconsole C:\path\to\RATAttack.py`. You can also pass `--icon=<path\to\icon.ico>` to use any custom icon. Once it is compiled successfully, find the .exe file in C:\Python37\Scripts\dist\. You can change the name of the .exe to anything you wish. BEWARE! If you run the compiled .exe, the script will move itself to startup and start with your PC to run at startup. You can return to normal by using the /self_destructoption or manually removing C:\Users\Username\AppData\Roaming\Portal directory and C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\portal.lnk(although I recommend removing them manually for the time being). Modifying Settings: You can also modify the name of hidden .exe file and location & name of the folder where the hidden .exe will hide itself. To do this; modify compiled_name and hide_folder respectively. Assign your known chat ids to beginning of RATAttack.py Download: [HIDE]. [Hidden Content]]
  2. itsMe

    RedDeer RAT 2.2

    [HIDE][Hidden Content]] Pass: level23hacktools.com
  3. J0k3rj0k3r

    RT101 RAT

    Download [Hidden Content] pass level23hacktools
  4. J0k3rj0k3r

    LeGend Rat v1.9

    Download [Hidden Content] Pass level23hacktools
  5. What is the best Multi-Platform Remote Administration Tool / Remote System Control Tool? I have heard about Galileo RCST (Remote Control System Tool) and 888 RAT.
  6. dEEpEst

    xTSR v1.1.0.6 [Cracked]

    Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  7. itsMe

    Seafko Rat

    Videos: [Hidden Content] File: [HIDE][Hidden Content]] Info This is "a multi protocol multi operating system" remote adminstration tool , This is the first system to use three protocols establishing all time communication , there is four main thing this design provides that no other system provide first Unlimited number of machines to control. Extreme reliability. Android and Windows control at the same time. No port forwarding "IRC,HTTP".
  8. 0x1

    Seafko Rat 3.9

    Seafko Rat 3.9 General Features Download: [Hidden Content]
  9. [HIDE][Hidden Content]]
  10. dEEpEst

    RAT Spreading Guide

  11. Umbreon Rootkit ------------------------------------------------------------------------------------------------------------------------------ You're Welcome Faggots! ------------------------------------------------------------------------------------------------------------------------------ Dependencies: OpenSSL binaries, libs, headers (or a smart user) Password hashing format is Whirlpool. There's a tool included in utils. The installer actually uses this, but your mileage may vary compiling it on strange systems. If you run into issues just edit the installer script a bit. Bring a static-compiled pwgen and unfuck if you're desperate to get it working ------------------------------------------------------------------------------------------------------------------------------ To use(Don't be stupid!) bash setup bash root.sh [USERNAME] [PASSWORD] - This will set the login to the rootkit user ------------------------------------------------------------------------------------------------------------------------------ Extra Files: portchecker | checks specified port promptlog | successful SSH root passwords ------------------------------------------------------------------------------------------------------------------------------ To Fix Server If #RIPed compile and run utils/unfuck.c Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  12. ThunderShell ThunderShell is a C# RAT that communicates via HTTP requests. All the network traffic is encrypted using a second layer of RC4 to avoid SSL interception and defeat network detection on the target system. RC4 is a weak cipher and is employed here to help obfuscate the traffic. HTTPS options should be used to provide integrity and strong encryption. Advantage against detection The "core" RAT doesn't require a second stage to be injected / loaded in memory. Version 2.1.2 (11/01/2019) [HIDE][Hidden Content]]
  13. Socket Features Stable Connection Asynchronous Socket Multi-Hosts Multi-Ports Multi-Clients Encrypted Traffic [HIDE][Hidden Content]]
  14. Hey. Im searching for someone whos highly advanced with reverse engineering & cracking of .exe file. I am trying to unlock the full features of a hacking tool coded in C++ and Delphi programming languages by a very skilled hacker. I would assume this tool has some anti protection features against reverse engineering & cracking methods of the tool i want cracked. How ever, since hacker groups such as Anonymous, The Shadow Brokers (with more) has managed to hack into NSA, CIA, FBI with other secret organisations across the world to steal highly classified and secret hacking tools, information etc... Im guessing nothing is completely secure anymore. Anyone willing to take on a challenge? Hey. Anyone willing to take on this highly advanced challenge?
  15. dEEpEst

    Comet RAT

    Download: [HIDE][Hidden Content]] Password: level23hacktool.com
  16. Kepa1960

    Que RAT escoger ? 2018

    Buenas. Hace ya 5 años que no toco ningún Rat, por lo que estoy oxidado. Antes me arreglaba bastante bien con Spynet, Cyber Gate, Ardamax, etc. Ya sé que estos Rat y el Keylooger están muy anticuados. Mi consulta es, cual me recomendáis, alguno que sea sencillo de usar y claro que los Cryptes valgan para sus server. Gracias a todos. *** Si este tema no va aquí, perdonar y por favor mover lo a donde corresponda.
  17. dEEpEst

    RAT via Telegram (Python 2.7)

    RAT-via-Telegram Windows Remote Administration Tool via Telegram (Python 2.7) | Originally created by Ritiek Why another one? The current Remote Administration Tools in the market face 2 major problems: Lack of encryption. Require port forwarding in order to control from hundreds of miles. This RAT overcomes both these issues by using the Telegram bot API. Fully encrypted. The data being exchanged cannot be spied upon using MITM tools. Telegram messenger app provides a simple way to communicate to the target without configuring port forward before hand on the target. Features: Keylogger with window title log included Get target PC's Windows version, processor and more Get target PC's IP address information and approximate location on map Delete, Move files Show current directory Change current directory List current or specified directory Download any file from the target Upload local files to the target. Send your image, pdf, exe or anything as file to the Telegram bot Autostart playing a video in fullscreen and no controls for a youtube video on target Take Screenshots Execute any file Access to microphone Start HTTP Proxy Server Freeze target's keyboard Schedule tasks to run at specified datetime Encode/Decode all local files Ping targets Update .exe -- thanks LearnerZone Self-Destruct RAT Change wallpaper from file or url Execute arbitrary python 2.7 on the go Execute cmd shell [TODO] Browser (IE, Firefox, Chrome) cookies retrieval [TODO] Password retrieval [TODO] Monitor web traffic (graphically?) [TODO] Fine-tuning scripting (i.e.: if app x is opened y is executed) [TODO] Freeze target's mouse [TODO] Capture clipboard (Text, Image) [TODO] Hide desktop icons [TODO] Take snapshots from the webcam (if attached) [TODO] Audio compression Thanks Dviros: Chrome login/password retrieval Display ARP table Get active processes and services Shutdown/Reboot computer Display DNS Cache & More coming soon! Screenshots: Installation & Usage: Clone this repository. Set up a new Telegram bot talking to the BotFather. Copy this token and replace it in the beginning of the script. Install the dependencies: pip install -r requirements.txt. Install pyHook 64-bit or 32-bit depending on your system. For 64-bit- pip install pyHook-1.5.1-cp27-cp27m-win_amd64.whl. For 32-bit- pip install pyHook-1.5.1-cp27-cp27m-win32.whl. To run the script: python RATAttack.py. Find your bot on telegram and send some command to the bot to test it. To restrict the bot so that it responds only to you, note down your chat_id from the console and replace it in the script and comment out the line return True. Don't worry, you'll know when you read the comments in the script. - A folder named `RATAttack` will be created in your working directory containing `keylogs.txt` and any files you upload to the bot. Commands: When using the below commands; use / as a prefix. For example: /pc_info. arp - display arp table capture_pc - screenshot PC cmd_exec - execute shell command cp - copy files cd - change current directory delete - delete a file/folder download - download file from target decode_all - decode ALL encoded local files dns - display DNS Cache encode_all - encode ALL local files freeze_keyboard - enable keyboard freeze unfreeze_keyboard - disable keyboard freeze get_chrome - Get Google Chrome's login/passwords hear - record microphone ip_info - via ipinfo.io keylogs - get keylogs ls - list contents of current or specified directory msg_box - display message box with text mv - move files pc_info - PC information ping - makes sure target is up play - plays a youtube video proxy - opens a proxy server pwd - show current directory python_exec - interpret python reboot - reboot computer run - run a file schedule - schedule a command to run at specific time self_destruct - destroy all traces shutdown - shutdown computer tasklist - display services and processes running to - select targets by it's name update - update executable wallpaper - change wallpaper You can copy the above to update your command list via BotFather so you don't have to type them manually. Compiling: How To Compile: Either: Replace your path in compileAndRun.bat (running this will actually run the executable) Or: Run `pyinstaller --onefile --noconsole C:\path\to\RATAttack.py`. You can also pass `--icon=<path\to\icon.ico>` to use any custom icon. Once it is compiled successfully, find the .exe file in C:\Python27\Scripts\dist\. You can change the name of the .exeto anything you wish. BEWARE! If you run the compiled .exe, the script will hide itself and infect your PC to run at startup. You can return to normal by using the /self_destruct option or manually removing C:\Users\Username\AppData\Roaming\Portal directory and C:\Users\Username\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\portal.lnk (although I recommend removing them manually for the time being). Modifying Settings: You can also modify the name of hidden .exe file and location & name of the folder where the hidden .exe will hide itself. To do this; modify compiled_name and hide_folder respectively. Assign your known chat ids to beginning of RATAttack.py Notes: Currently only Python2 is supported. Python3 support will be added soon! Contributing: This project is still in very early stages, so you can expect some bugs. Please feel free to report them! Even better, send a pull request :) Any new features and ideas are most welcome! Please do submit feature requests by creating Issues Disclaimer: This tool is supposed to be used only on authorized systems. Any unauthorized use of this tool without explicit permission is illegal. License: The MIT License Download: [HIDE][Hidden Content]]
  18. dEEpEst

    Prototype RAT

    Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  19. dEEpEst

    Archelaus RAT

    Doownload: [HIDE][Hidden Content]] Password: level23hacktools.com
  20. dEEpEst

    ALMAMORY RAT

    Download: [HIDE][Hidden Content]] Passwoord: level23hacktools.com
  21. dsfdsfwet

    888 rat new 2018 crack

    File infected, banned, fuck You
  22. Download: [HIDE][Hidden Content]] Password: level23hacktools.com
  23. dEEpEst

    Anti Globalizacion RAT

    Here you can create your backdoor. Do not use things randomly, because if you misuse the options the backdoor can work badly. If for example you want a backdoor that penetrates without startups, do not put options, leave everything like that, you have to put only the ip and the door. If instead you want the backdoor to start even when the computer is restarted, you only have to put Start Up, if you want also, you can put Installation on (none). If you want you can also create an empty backdoor, like the first one I explained to you, then use hotfusion to put it in start up (not in local machine). If you create a 64-bit backdoor but your pc slave has a 32-bit system, it does not work. If you put the icon on your backdoor, you can not put backdoor + ico build, it makes no sense. So use the options intelligently. For example, if you encrypt, you have to create an empty backdoor with no options, no start up, no icons, no nines and then crypts. Last thing. The backdoors were created without binder. Everything that starts with the backdoor (such as ccleaner) has been inserted directly into the stub. I did not use the binder. Enjoy! Download: [hide][Hidden Content]] Password: level23hacktools.com
  24. Bipo

    LuminositeLink jail

    LuminosityLink Hacking Tool Author Gets 30-Months Prison Sentence October 17, 2018Swati Khandelwal A 21-year-old Kentucky man who previously pleaded guilty to developing, marketing, and selling an infamous remote access trojan (RAT) called LuminosityLink has now been sentenced to 30 months in prison. According to a press release published Monday by U.S. Attorney’s Office, Colton Grubbs, who used online moniker 'KFC Watermelon,' was pleaded guilty for three counts--unlawfully accessing computers in furtherance of a criminal act, money laundering, and illegal removal of property to prevent its lawful seizure. First surfaced in April 2015, the LuminosityLink RAT (Remote Access Trojan), also known as Luminosity, was a hacking tool that was sold for $40, marketing itself as a legitimate tool for Windows administrators to "manage a large number of computers concurrently." However, in reality, LuminosityLink was designed to be a dangerous, remote access trojan that among other malicious features, allowed Grubbs' customers to: Record the keys that victims pressed on their keyboards Surveil victims using their computers' cameras and microphones View and download the computers' files Steal names and passwords used to access websites In his initial plea filing, Grubbs claimed that the LuminosityLink RAT was never intended to be used maliciously, and was a legitimate tool for system administrators. However, in a plea agreement signed a year ago, Grubbs admitted that his malware would be used by some customers to remotely access and control computers without their victims' computers without the victims' knowledge or consent. Grubbs also admitted of offering assistance to his customers to use the LuminosityLink RAT through posts and group chats on his own luminosity.link website and public internet forum HackForums.net. According to his last year plea agreement, the LuminosityLink RAT was sold for $39.99 apiece to more than 6,000 individuals, who used it maliciously to gain unauthorized access to thousands of computers across 78 countries worldwide. According to the Justice of Department, Grubbs has been ordered to serve 85 percent of his prison sentence under federal law, and upon release, he will be under the supervision of the United States Probation Office for a term of 3 years. Besides his sentence of incarceration, Grubbs has also been ordered to forfeit the money he made from his crimes, including 114 bitcoins (valued at over $725,000 today) which were seized by the FBI.
  25. Download: [HIDE][Hidden Content]] Password: level23hacktools.com