Hello friends, today hacking loops is exposing the source code of RAT ( remote administration tool) in C language. With this source code you can take help in designing your own hack tools like keyloggers, remote chat montiors, screen capture tools,etc ..Now you can see how the coding is being done. Source code of RAT will help you in understanding the working of RAT remote administration tool and how it logs data and steals information and everything. This source code is of F.B.I RAT( full backdoor integration) and most interesting thing is that it contains all the advanced features.
|RAT source code full
How this source code is helpful for hackers? The answer is simple now you have source code modify it accordingly , change variable names, some passing parameters or add some dead codes and make it completely FUD(fully undetectable) from antivirus and use it to hack. And most important advantage is that you will keep yourself save from downloading ****ing Trojans from the internet in name of hack tools as most of them contains spy malware and keyloggers in it.
Brief description of features that this RAT has:
Supports xp/Vista/Windows 7, all features have been tested on these OS’s including injection, but there have been some limitations on the sniffer.
- Execute, Normal & Hidden.
- Copy & Paste like Windows explorer.
- Display size of file, and type.
- Download & Upload (re-coded) Multi-threaded downloads, which allows you to download multiple files at once.
- Stop, Pause and resume active transfer’s.
- Search files.rename files.
- Process Manager – Refresh and kill processes running
- Window Manager – Refresh and close windows, shows hidden and visable windows.
- Installed Programs – List’s program name and Directory.
- Installed Services – Lists installed services, allows you to stop, start and pause services.
- Allows the user to have a time & date stamp, and active window, as well as custom colour coding.
- Uses a keyboard hook, so no dropped keys like most keyloggers, and 0 CPU usage.
- Offline and Online keylogs, Offline keylogs are downloaded once you start the Online keylogger, and once the online keylogger session has finished, the offline keylogger begins again.
- Reworked transfer & Capture.
- Allows the user to select the quality, intervals of screen shots and stop & start screen capture, also allows the user to take a single snapshot when ever they want.
- Reworked transfer & Capture.
- Allows the user to stop & start captures also allows an interval for the sending of captures.
- “Net stat” Allows the user to view local connections on the computer, and then select which connection you want to sniff, displays remote server IP and local IP & Port information, also the state of the connection, all this information comes from the TCP stack of windows.
- Packet sniffer, sniffs the raw packets, using windows RAW sockets and formats them into text for you to read, i have tested this with Real world websites, and has allowed me to steal information, such as website logins, but because of the limitations of vista and windows 7 it is likely it will not work, for those two operating systems.
Choice of injection, This source comes with another project that allows you to inject your server into the default browser of the Victim, you can also use the exe and run it normally withoutinjection, for testing, the injection code has been modified from an old source i found, i took the source and improved it, made it detect the default browser and made it load the API’s indirectly, so you can encrypt the API strings, and bypass AV’s.
I hope you all have like my post. If you have any queries in the source code like how the things are working ask me in form of comments.