Skip to content

Releases: itzdaimy/Simple-Rat

v1.0.6

25 Mar 13:51
1b56708

Choose a tag to compare

🦠 Virus total: https://www.virustotal.com/

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
  • 🦠 Undetected & Persistent::
    Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
    Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup.
  • πŸ”„ Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.
  • πŸ’₯ Flash: Flash the victim! Make there screen turn white!

v1.0.5

24 Mar 07:31
d08cb61

Choose a tag to compare

🦠 Virus total: https://www.virustotal.com/gui/file/4ec41afc275e281584f046a65ed5b1e04ea1a5033d5b10ea15e16b0f7b02a1a0

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
  • 🦠 Undetected & Persistent::
    Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
    Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup.
  • πŸ”„ Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.

v1.0.4

23 Mar 10:17
a062401

Choose a tag to compare

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
  • 🦠 Undetected & Persistent::
    Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
    Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup.
  • πŸ”„ Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.

v1.0.3

23 Mar 08:47
8e56dc2

Choose a tag to compare

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
  • 🦠 Undetected: This RAT has always been undetected, it works with real time protection on, and doesnt flag if you do a scan.

v1.0.2

22 Mar 13:49
37d4c6b

Choose a tag to compare

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.

v1.0.1

21 Mar 16:40
03d77bc

Choose a tag to compare

πŸš€ Features

  • πŸ”‘ Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
  • πŸ’» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
  • ⚑ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
  • πŸ“œ Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
  • πŸ–ΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
  • πŸ‘₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
  • πŸ” Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.