
- Edited
- The Newbie
This RAT is packed with cutting-edge features designed to give you total control over the target system while maintaining stealth and efficiency.
Why Choose This RAT?
With this RAT, you gain access to a powerful suite of tools. From managing processes to full control over file systems, you can take over the system with a few simple commands. Plus, the added layers of encryption, serialization, and reverse proxy support ensure your activities remain concealed from blue teams and defenders.
Key Features for Maximum Efficiency
High-Performance Network Communication
- TCP Network Stream: Full support for both IPv4 and IPv6, making communication robust and flexible across all environments.
- Fast Network Serialization: Implemented with Protocol Buffers for faster data transfers, minimizing latency during communication.
- Encrypted Communication (TLS): All data is secured with industry-standard TLS encryption, ensuring that network traffic remains hidden and secure.
Advanced Networking Support
- UPnP Support: Automatic port forwarding makes it easy to traverse internal networks, allowing seamless connections without the need for manual configuration.
- Reverse Proxy (SOCKS5): Set up a SOCKS5 proxy for tunneling traffic through the infected system, giving you remote network access.
Complete System Control
Task Manager
- View and manage running processes in real-time.
---
File Manager
- Upload, download, delete, and manipulate files and directories at will.
---
Startup Manager
- Gain persistence by controlling startup programs, ensuring you stay in control across reboots.
---
Remote Shell
Execute commands directly on the compromised machine from an interactive shell.
Remote Execution
- Run arbitrary executables with ease to execute any payload or binary.
---
System Power Commands
- Issue system commands like restart, shutdown, and standby — perfect for keeping control over system states.
---
Advanced Monitoring Tools
Remote Desktop
- Take full control of the target’s desktop, allowing you to view and manipulate their GUI environment remotely.
Keylogger (Unicode Support)
- Record all keystrokes silently, including those in non-Latin scripts, for comprehensive monitoring.
- Registry Editor: Modify or add to the system's registry, enabling deep system tweaks and persistence strategies.
Data Recovery & Exfiltration
- Password Recovery: Recover credentials from commonly used browsers and FTP clients, including Chrome, Firefox, and FileZilla.
And So Much More...
This RAT provides many more powerful capabilities, making it the ultimate tool for red team operations, penetration testing, and advanced post-exploitation tasks.
⬇️Download Here
Supported Runtimes and Operating Systems
This RAT requires .NET Framework 4.5.2 or higher to run and is compatible with a wide range of Windows operating systems, including both 32-bit and 64-bit versions. Supported operating systems include:
- Windows 11
- Windows Server 2022
- Windows 10
- Windows Server 2019
- Windows Server 2016
- Windows 8/8.1
- Windows Server 2012
- Windows 7
- Windows Server 2008 R2