You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16-16Lines changed: 16 additions & 16 deletions
Original file line number
Diff line number
Diff line change
@@ -7,8 +7,23 @@
7
7
PythonRAT is a Command and Control (C2) server which can control multiple machines running the Remote Administration Trojan (RAT) forming a botnet cluster which was written in Python3.
8
8
9
9
10
+
# Features
11
+
12
+
- Keylogger written as a class
13
+
- Keylogger can be started and stopped remote with options to _dump_ or _overwrite_ the log file
14
+
- Check privilege level (Administrator/User)
15
+
- Download files from target
16
+
- Download files from specified URL
17
+
- Upload files to target
18
+
- C2 allows control of multiple target sessions w/ background session
19
+
- Issue a _sendall *command*_ to every active session
20
+
- Persistence by creating a registry entry (Windows)
21
+
- Spawn other programs
22
+
- Screenshot of the target's screen which is sent to server
23
+
- Remote shutdown of the backdoor _(executable is NOT safely removed)_
24
+
25
+
10
26
## Table of Contents
11
-
-[Features](#features)
12
27
-[Usage Manuals](#usage-manuals)
13
28
*[C2 Manual](#c2-manual)
14
29
*[Session Manual](#session-manual)
@@ -30,21 +45,6 @@ PythonRAT is a Command and Control (C2) server which can control multiple machin
30
45
*[Session Options](#session-options)
31
46
*[Backgrounding and Killing Session](#backgrounding-and-killing-session)
32
47
33
-
# Features
34
-
35
-
- Keylogger written as a class
36
-
- Keylogger can be started and stopped remote with options to _dump_ or _overwrite_ the log file
37
-
- Check privilege level (Administrator/User)
38
-
- Download files from target
39
-
- Download files from specified URL
40
-
- Upload files to target
41
-
- C2 allows control of multiple target sessions w/ background session
42
-
- Issue a _sendall *command*_ to every active session
43
-
- Persistence by creating a registry entry (Windows)
44
-
- Spawn other programs
45
-
- Screenshot of the target's screen which is sent to server
46
-
- Remote shutdown of the backdoor _(executable is NOT safely removed)_
0 commit comments