• XSS.stack #1 – первый литературный журнал от юзеров форума

remote access tool(RAT)

batman777

RAID-массив
Забанен
Регистрация
10.08.2022
Сообщения
87
Реакции
2
Wrong section
Пожалуйста, обратите внимание, что пользователь заблокирован
Who can provide me with an undetectable RAT, I need to infect a machine, it can be through email or a memory, who can help me. or who wants to join my project
 
Пожалуйста, обратите внимание, что пользователь заблокирован
i can setup a rat for you and make it FUD, scantime and runtime. i can setup it for you and we test fud bypass windows defender
i do everything for you, you confirm its ok the you can pay, you can chat e on telegram we do this right away
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Plenty of RAT source codes available..why not just use them?
In almost all cases, when rat is stable (im talking about public & open source rats) dont have much features.
Remcos is a great rat, if you have money there isn't better option.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
As Aster said, There is no better option than Remcos. But if you're broke, I advise DcRat

Edit: They're detected by default. You can try This Method by me to Bypass all AV's without crypter
I have downloaded the files from github but I can't understand how it works, can you help me?
 
Пожалуйста, обратите внимание, что пользователь заблокирован
usually the best results are obtained with private RATs but they cost a lot
Paid - Remcos
Free - Quasar/Async
 
Последнее редактирование:
Пожалуйста, обратите внимание, что пользователь заблокирован
links ? with updated one please
 
thanks , tried everything everything is nice , espicially dcrat comes with ransomware features
 
Пожалуйста, обратите внимание, что пользователь заблокирован
thanks , tried everything everything is nice , espicially dcrat comes with ransomware features
If i can advice you something:
Dont rely on ransomware plugin in DcRat (or any other rat), beacuse it can have encryption or decryption vulns. Build rw (you can use Yashma builder) and execute it on selected client.
Same with passwords stealing features.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх