Today

VioletRat [4.7] | Leaked: @pakreverselab

RAT для Windows, оснащенный всем функционалом для удаленного контроля на ПК. Функционал большой чем и отличается от других типов такого же ПО, имеет нестандартные цвета в интерфейсе вырвиглазного формата. Продается на тематических форумах и канала от 100$.

Подробнее

Как и сообщалось выше в описании, то данный RAT по сей день продается от 100$ до 900$ за пожизненную лицензию. У проекта есть собственный сайт, а также телеграмм канал с подробностями.

Особенности (взяты с официального источника)

Settings

  • Server Settings: Shows the listener settings and make you able to edit it, also shows the traffic of VioletRat and the number of victims.
  • Hook Settings: The hook makes you able to link VioletRat to a telegram bot and a discord server, also using the hook you can automatically execute cookie stealing and crypto wallets grabbing for every new victim.
  • Theme Settings: You can change the rows color and also change the language of the tool, VioletRat supports English, Chinese and Russian.

Device Control

  • VNC: Real-time desktop screen control with the ability to control the keyboard and the mouse, you'll see what your target is doing and also control his system.
  • CMD & File Manager: A remote command control also knowing as reverse shell capable of controlling the whole system using the system commands remotely, and remote file manager to control the PC's files like download, upload, run files, encrypt, decrypt, etc.
  • Microphone, Sys Sounds end Camera Manager: Gain access to the PC microphone to hear any ambient sounds around the target’s device. System Sounds let you capture all internal audio like videos, calls, Zoom meetings, and more. The Camera Manager allows full webcam control to record, snap photos, and watch the victim live in real time.
  • Location Manager: Location Manager lets you track the target’s real-time location using GPS or Wi-Fi data. View movement history and get accurate coordinates to monitor their location at any time.
  • Clipboard & Process Manager: Clipboard Manager lets you view everything the target copies and even modify it in real time. Process Manager gives you full control over running processes view, start, stop, or kill any task on the target's system.

System Control

  • File Executor: File Executor allows you to run files from the disk, directly in memory, via URLs, or even execute raw opcodes for shellcode. Perfect for stealthy and flexible payload deployment.
  • Power Manager: Power Manager gives you full control over the target device—put it to sleep, shut it down, restart, or log off the user with a single click.
  • Utilities Manager: Disable key system utilities like Task Manager, Regedit, and the firewall. You can also block system updates to maintain full, uninterrupted access.
  • Anti Resetting & Updating: Disables Windows system reset functionality and blocks Windows Update services to prevent recovery and system patching.
  • SysKiller & BSOD Absorber: System Killer corrupts the BIOS and destroys core kernel components, leaving the system in a critical, unrecoverable state. BSOD Absorber triggers a Blue Screen of Death, force-crashing the system instantly.
  • Active Windows Manager & Message Box showing: Active Windows Manager lets you monitor and control open windows on the target device. You can display custom message boxes as well.
  • Change Wallpaper & Installed Programs Manager: Wallpaper Manager allows you to change the target’s desktop background remotely. Installed Programs Manager lets you view, uninstall, or manipulate software installed on the system with ease.

Tools

  • Blank Screen: It blocks the screen for the victim and also blocks the keyboard and the mouse so he completely loses the control over the machine while you have a full control over it.
  • HVNC: The hvnc gives you the ability to control the desktop like opening browsers, file manager, cmd, powershell, etc. without notice from the victim, so it's like the vnc but more stealthy.
  • Clipper: The Clipper monitors the clipboard for cryptocurrency addresses and automatically replaces them with the attacker address, ensuring any transaction is redirected without the target noticing.
  • Offline/Online Keylogger: The offline/online Keylogger gives you ability to see every thing the victim wrote using it's keyboard also it shows you were did the victim write it, as an example let's say the victim tried to login in Facebook, it'll show you that those words the victim wrote (the user and pass) got written on Facebook login page.
  • Stealer: Extracts saved logins including usernames, passwords, and emails. It also grabs the Windows activation key, Wi-Fi passwords, email credentials, system tokens (like Discord), and more sensitive data stored on the system.
  • Grabber: Extracts the data directories from messaging apps like Telegram and WhatsApp, as well as from cryptocurrency wallet applications and browser-based crypto wallet extensions.
  • Fun: Do a lot of crazy stuff to the machine like turn off/on taskbar, turn off/on desktop icons, turn off/on clock, turn off/on notifications, mouse swap left to right and top to bottom, Text to speech that makes you able to let the PC talk to the victim with voice.
  • Chat: Chat allows you to open a direct communication channel between you and the victim. Send and receive messages in real time, creating an interactive session directly on their device and they can't stop it until you close it yourself.
  • File Grabber: File Grabber scans the entire machine to locate and extract files based on your criteria. You can search by specific file names, extensions, or types to quickly collect targeted data from the system.

Defender Manipulation

  • UAC Manager: the UAC manager is able to turn the UAC off or on inside the machine so if you turned the UAC off, you can run any file as administrator without asking the user himself.
  • UAC Bypass: The UAC Bypass helps you in rerunning your payload with administrator privileges using windows vulnerabilities like Cmstp, Computerdefaults, DismCore, etc.
  • Ask UAC: This if you want to get administrator privileges normally by asking the user to run your payload as admin.
  • Defender Killer: Simply it kills the windows defender making it impossible for your payload to get detected in runtime, and this process is irreversible so if you killed the defender there is no way to get it working back even with restarting the machine.

Network Manipulation

  • DOS Attack: You can do a ddos attack on any network with any port using your victims as a botnet.
  • Connections Manager: The connections manager gives you access on all the connections on your victim's PC, like all programs/services that are using the internet and helps you spying on them or even kill/block them.
  • NetDiscover: NetDiscover scans the whole network (LAN) of your victim and shows you all devices within the same network as your victim, also it give you the main gateway of the network (Router) and all devices Mac addressees.
  • Network Jammer: Network Jammer lets you disrupt internet access for any device on the same local network as the victim. The victim's device acts as the base for launching targeted LAN-based denial attacks, effectively cutting off selected devices from the internet.

Скачать

Сообщество THREAD предупреждает, что перед запуском предоставленного программного обеспечения необходимо проявить особую осторожность. Для защиты рабочих станций от возможного заражения рекомендуется использовать виртуальную машину или песочницу.
Пароль от архива и соглашение

THREAD CLOUD | VT