All Projects → NYAN-x-CAT → Lime Rat

NYAN-x-CAT / Lime Rat

Licence: mit
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)

Projects that are alternatives of or similar to Lime Rat

Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+796.53%)
Mutual labels:  malware, remote, trojan, backdoor, rat, tool
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-52.94%)
Mutual labels:  malware, remote, trojan, backdoor, rat
ToxicEye
👽 Program for remote control of windows computers via telegram bot. Written in C#
Stars: ✭ 305 (-54%)
Mutual labels:  administration, backdoor, malware, trojan, rat
Mass Rat
Basic Multiplatform Remote Administration Tool - Xamarin
Stars: ✭ 127 (-80.84%)
Mutual labels:  malware, remote, backdoor, rat, tool
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-41.63%)
Mutual labels:  malware, backdoor, rat, ransomware
Asyncrat C Sharp
Open-Source Remote Administration Tool For Windows C# (RAT)
Stars: ✭ 819 (+23.53%)
Mutual labels:  remote, backdoor, rat, tool
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (-42.68%)
Mutual labels:  malware, trojan, rat, ransomware
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-97.59%)
Mutual labels:  malware, trojan, backdoor, rat
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-79.64%)
Mutual labels:  malware, trojan, backdoor, rat
Skyrat
SkyRAT - Powershell Remote Administration Tool
Stars: ✭ 21 (-96.83%)
Mutual labels:  remote, rat, tool, administration
Remot3d
Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors
Stars: ✭ 263 (-60.33%)
Mutual labels:  malware, remote, trojan, backdoor
trolo
trolo - an easy to use script for generating Payloads that bypasses antivirus
Stars: ✭ 45 (-93.21%)
Mutual labels:  malware, trojan, rat
Engine
Droidefense: Advance Android Malware Analysis Framework
Stars: ✭ 386 (-41.78%)
Mutual labels:  malware, trojan, ransomware
RSB-Framework
Windows/Linux - ReverseShellBackdoor Framework
Stars: ✭ 44 (-93.36%)
Mutual labels:  backdoor, trojan, rat
ConTroll Remote Access Trojan
Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises.
Stars: ✭ 69 (-89.59%)
Mutual labels:  malware, trojan, rat
Backdoor
A backdoor that runs on Linux and Windows
Stars: ✭ 36 (-94.57%)
Mutual labels:  backdoor, remote, trojan
Quasar
Remote Administration Tool for Windows
Stars: ✭ 4,897 (+638.61%)
Mutual labels:  remote, rat, administration
DcRat
A simple remote tool in C#.
Stars: ✭ 709 (+6.94%)
Mutual labels:  backdoor, remote, rat
Quiescis
Quescis is a powerful Remote Access Trojan for windows 💻 on C++
Stars: ✭ 56 (-91.55%)
Mutual labels:  administration, malware, rat
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (-4.07%)
Mutual labels:  trojan, backdoor, rat

Outdated. Archive it instead of delete it


LimeRAT v0.1.9

Remote Administration Tool For Windows


Description

Simple yet powerful RAT for Windows machines. This project is simple and easy to understand, It should give you a general knowledge about dotNET malwares and how it behaves.


Main Features

  • .NET
    • Coded in Visual Basic .NET, Client required framework 2.0 or 4.0 dependency, And server is 4.0
  • Connection
    • Using pastebin.com as ip:port , Instead of noip.com DNS. And Also using multi-ports
  • Plugin
    • Using plugin system to decrease stub's size and lower the AV detection
  • Encryption
    • The communication between server & client is encrypted with AES
  • Spreading
    • Infecting all files and folders on USB drivers
  • Bypass
    • Low AV detection and undetected startup method
  • Lightweight
    • Payload size is about 25 KB
  • Anti Virtual Machines
    • Uninstall itself if the machine is virtual to avoid scanning or analyzing
  • Ransomware
    • Encrypting files on all HHD and USB with .Lime extension
  • XMR Miner
    • High performance Monero CPU miner with user idle\active optimizations
  • DDoS
    • Creating a powerful DDOS attack to make an online service unavailable
  • Crypto Stealer
    • Stealing Cryptocurrency sensitive data
  • Screen-Locker
    • Prevents user from accessing their Windows GUI
  • And more
    • On Connect Auto Task
    • Force enable Windows RDP
    • Persistence
    • File manager
    • Passowrds stealer
    • Remote desktop
    • Bitcoin grabber
    • Downloader
    • Keylogger

Prerequisites

To open project you need:

  1. Visual Studio 2017
  2. This repository

Peek

Project

Ransomware

Critical Process


Plugin Example

VB.NET

'Easy to create a DLL plugin
Public Class Main
'Simple Msgbox
 Public Shared Sub CN(ByVal H As String, ByVal P As Integer, ByVal K As String, ByVal SP As String, ByVal PW As String, ByVal FP As String, ByVal HW As String, ByVal BT As String, ByVal PB As String)

  Msgbox("Hello Client!")

  Send("MSG" + SPL + "Hello Server!")
  'Client will send msg back to server, MSG will be showen in [LOG] Tab
	
 End Sub	
End Class

C#

public class Main
{
    // Simple Msgbox
    public static void CN(string H, int P, string K, string SP, string PW, string FP, string HW, string BT, string PB)
    {
        Msgbox("Hello Client!");

        Send("MSG" + SPL + "Hello Server!");
		// Client will send msg back to server, MSG will be showen in [LOG] Tab
    }
}

Testing

  1. Open "LimeRAT.sln"
  2. Set Compiler to "Debug" mode
  3. On Solution Explorer, Right click on "Solution LimeRAT Project" and press "Rebuild Solution"
  4. Press Run button. be aware that both client and server are localhost

Compiling

  1. Open "LimeRAT.sln"
  2. Set Compiler to "Release" mode
  3. On Solution Explorer, Right click on "Solution LimeRAT Project" and press "Rebuild Solution"
  4. Everything will be under "\Project_EXE\Release"
  5. Convert stub.exe to stub.il, using Ildasm

Download SRC and compiled version

https://github.com/NYAN-x-CAT/Lime-RAT/releases

This project was only tested on local-lab[LAN]. I did not test it on external-lab[WAN].
Server tested on Windows 10, Client tested on virtual machine windows 7.

Notes

  1. While using ransomware, restore point won't be deleted unless payload is running hight privilege
  2. Anti-Kill (BSOD) won't work unless payload is running hight privilege

Found a bug? Please, report it here https://github.com/NYAN-x-CAT/Lime-RAT/issues/new


Author

  • NYAN CAT

Donation

Buy me a coffee!

  • XMR: 49H8Kbf15JFN2diG5evGHA5G49qhgFBuDid86z3MKxTv59dcqySCzFWUL3SgsEk2SufzTziHp3UE5P8BatwuyFuv1bBKQw2
  • BTC: 12hTx7u7AqdNr8qo4UFuLwb6XAVjoDioax

Support


Disclaimer

I, the creator, am not responsible for any actions, and or damages, caused by this software.

You bear the full responsibility of your actions and acknowledge that this software was created for educational purposes only.

This software's main purpose is NOT to be used maliciously, or on any system that you do not own, or have the right to use.

By using this software, you automatically agree to the above.


License

License

This project is licensed under the MIT License - see the LICENSE file for details

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].