Loading...
Features:
- Power options: Reboot and shutdown the system and log off the current user.
- Enumerate operations: Enumerate processes and retrieve information such as executable paths, folders, drives, screens, microphones, and cameras.
- Clipboard grabber: Retrieve data from the clipboard, such as files or text.
- Execute CS, VB, VBS, PS: Run and compile code inside the victim’s system, including C#, VB code, and scripts in bat, VBS, or PS.
- Denial of Service (DoS): Perform a DoS attack using the victim’s computer.
- Take screenshots: Capture screenshots from the victim’s computer screen and obtain the screen’s width and height.
- Retrieve Telegram and Discord path: Obtain the installation path of Telegram and the path of local database files of Discord.
- System information: Query and retrieve information about the victim, such as IP address, hostname, country, and more.
- Persistence: Maintain persistence by modifying the registry, such as the Winlogon and run registry keys, and create scheduled tasks.
Product images
Replies
Confirm Deletion
Are you sure you want to delete this reply? This action cannot be undone.
There are no replies yet. Be the first to reply.