Releases: itzdaimy/Simple-Rat
Releases Β· itzdaimy/Simple-Rat
v1.0.6
π¦ Virus total: https://www.virustotal.com/
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
- π¦ Undetected & Persistent::
Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup. - π Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.
- π₯ Flash: Flash the victim! Make there screen turn white!
v1.0.5
π¦ Virus total: https://www.virustotal.com/gui/file/4ec41afc275e281584f046a65ed5b1e04ea1a5033d5b10ea15e16b0f7b02a1a0
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
- π¦ Undetected & Persistent::
Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup. - π Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.
v1.0.4
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
- π¦ Undetected & Persistent::
Undetected: The RAT hides its console window and detaches from it so no taskbar icon is visible.
Persistence Automatically copies itself to the AppData folder and adds a registry key to run at startup. - π Auto-Reconnect: If the connection to the server fails, it will retry every 2 minutes.
v1.0.3
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
- π¦ Undetected: This RAT has always been undetected, it works with real time protection on, and doesnt flag if you do a scan.
v1.0.2
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.
v1.0.1
π Features
- π Keylogger: Capture every keystroke typed on the victim machine and save it to a file on the attacker's machine in real-time.
- π» System Information Gathering: Retrieve detailed information about the victim's machine, including OS, CPU, RAM, and more.
- β‘ Remote Command Execution: Execute commands on the victim machine remotely via a simple command shell.
- π Logs: All captured keystrokes are logged and stored in a beautiful text file for easy tracking.
- πΌοΈ Screenshot Capture: Take screenshots of the victim's desktop and save them on the attacker's machine.
- π₯ Multi-Client Support: Support for multiple clients connected to the server simultaneously, allowing control of multiple victim machines.
- π Secure Communication: Communication between the client (victim) and server (attacker) happens over TCP.