All Projects → quantumcored → Paradoxiarat

quantumcored / Paradoxiarat

Licence: mit
ParadoxiaRat : Native Windows Remote access Tool.

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Paradoxiarat

paradoxiaRAT
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 583 (+47.59%)
Mutual labels:  backdoor, botnet, rat, keylogger, hacking-tool, red-team
Powershell Rat
Python based backdoor that uses Gmail to exfiltrate data through attachment. This RAT will help during red team engagements to backdoor any Windows machines. It tracks the user activity using screen capture and sends it to an attacker as an e-mail attachment.
Stars: ✭ 636 (+61.01%)
Mutual labels:  hacking, hacking-tool, backdoor, rat
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-64.05%)
Mutual labels:  hacking, hacking-tool, backdoor, rat
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (-21.01%)
Mutual labels:  hacking, backdoor, rat, botnet
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-2.03%)
Mutual labels:  hacking, hacking-tool, backdoor, rat
Teardroid-phprat
🇮🇳 🤖 It's easy to use android botnet work without port forwarding, vps and android studio
Stars: ✭ 417 (+5.57%)
Mutual labels:  botnet, rat, keylogger, hacking-tool
Blacknet
Free advanced and modern Windows botnet with a nice and secure PHP panel.
Stars: ✭ 271 (-31.39%)
Mutual labels:  bot, hacking, rat, botnet
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-52.91%)
Mutual labels:  hacking, hacking-tool, backdoor
Gobot2
Second Version of The GoBot Botnet, But more advanced.
Stars: ✭ 431 (+9.11%)
Mutual labels:  bot, keylogger, botnet
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+155.44%)
Mutual labels:  bot, hacking, hacking-tool
Telegram Rat
Windows Remote Administration Tool via Telegram. Written in Python
Stars: ✭ 201 (-49.11%)
Mutual labels:  bot, hacking, rat
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+187.59%)
Mutual labels:  hacking, hacking-tool, red-team
Kratosknife
KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Stars: ✭ 97 (-75.44%)
Mutual labels:  bot, rat, botnet
Richkware
Framework for building Windows malware, written in C++
Stars: ✭ 315 (-20.25%)
Mutual labels:  bot, hacking, keylogger
Networm
Python network worm that spreads on the local network and gives the attacker control of these machines.
Stars: ✭ 135 (-65.82%)
Mutual labels:  hacking, backdoor, rat
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-91.9%)
Mutual labels:  bot, hacking, keylogger
Wifipassword Stealer
Get All Registered Wifi Passwords from Target Computer.
Stars: ✭ 97 (-75.44%)
Mutual labels:  hacking, hacking-tool, keylogger
Ghost
Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device. Ghost Framework gives you the power and convenience of remote Android device administration.
Stars: ✭ 992 (+151.14%)
Mutual labels:  hacking, backdoor, rat
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+186.58%)
Mutual labels:  hacking, hacking-tool, backdoor
PyIris
PyIris is a modular remote access trojan toolkit written in python targeting Windows and Linux systems.
Stars: ✭ 296 (-25.06%)
Mutual labels:  backdoor, rat, keylogger
Paradoxia Remote Access Tool.

Features

Paradoxia Console
Feature Description
Easy to use Paradoxia is extremely easy to use, So far the easiest rat!
Root Shell -
Automatic Client build Build Paradoxia Client easily with or without the icon of your choice.
Multithreaded Multithreaded Console server, You can get multiple sessions.
Toast Notifications Desktop notification on new session
Configurable Settings Configurable values in paradoxia.ini
Kill Sessions Kill Sessions without getting in session.
View Session information View Session information without getting in Session.

Paradoxia Client
Feature Description
Stealth Runs in background.
Full File Access Full access to the entire file system.
Persistence Installs inside APPDATA and has startup persistence via Registry key.
Upload / Download Files Upload and download files.
Screenshot Take screenshot.
Mic Recording Record Microphone.
Chrome Password Recovery Dump Chrome Passwords using Reflective DLL (Does not work on latest version)
Keylogger Log Keystrokes and save to file via Reflective DLL.
Geolocate Geolocate Paradoxia Client.
Process Info Get Process information.
DLL Injection Reflective DLL Injection over Socket, Load your own Reflective DLL, OR use ones available here.
Power off Power off the Client system.
Reboot Reboot the client system.
MSVC + MINGW Support Visual studio project is also included.
Reverse Shell Stable Reverse Shell.
Small Client Maximum size is 30kb without icon.

Installation (via APT)

$ git clone https://github.com/quantumcored/paradoxiaRAT
$ cd paradoxiaRAT
$ chmod +x install.sh
$ sudo ./install.sh

Example Usage :

  • Run Paradoxia
sudo python3 paradoxia.py
  • Once in paradoxia Console, The first step would be to build the Client, Preferably with an Icon.

pd1

  • After that's built, As you can see below it is detected by Windows Defender as a severe malware. Which is expected since it IS malware.

pd2

  • I'm going to transfer the client on a Windows 10 Virtual machine and execute it. After Executing it, It appears under Startup programs in task manager.

pd3

  • Also it has copied itself inside Appdata directory and installed under the name we specified during build.

pdmiss

  • At the same time, I get a session at server side.

pd4

  • First thing I'd do is get in the session and view information.

pd5

  • There are plenty of things we can do right now, but for example only, I will demonstrate keylogging.

pd6

You can see in the image above that It says it successfully injected dll, And in file listing there is a file named log.log, Which contains the logged keystrokes.

  • Lets view captured keystrokes.

pd7

Changelogs

  • This repository was home to 3 tools previously, Iris, Thawne and Previous version of Paradoxia. This can be found here.
  • Everything is entirely changed, Client has been rewritten, Infodb removed. Much new features added. Stability added.

Links

Developer

Hi my name's Fahad. You may contact me, on Discord or My Website

LICENSE

VIEW LICENSE

The Developer is not responsible for any misuse of Damage caused by the program. This is created only to innovate InfoSec and YOU. 👈

Donate

Help me with my future projects. Thank you. Donate with Crypto

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].