- Step 1. Go to Remote Access Trojan Download Github website using the links below
- Step 2. Enter your Username and Password and click on Log In
- Step 3. If there are any problems, here are some of our suggestions
Full Answer
What is a remote access trojan?
Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware. This malware is distributed simply by running zombie.exe. This file name can be changed to whatever.
What is controll_remote_access_trojan?
GitHub - Lithium876/ConTroll_Remote_Access_Trojan: Created a VERY SIMPLE remote access Trojan that will establish administrative control over any windows machine it compromises. … Failed to load latest commit information. DISCLAIMER ConTroll is for education/research purposes only.
Is there a remote administration tool for Windows?
Windows Remote Administration Tool via Telegram. Written in Python A repository full of malware samples. TechNowHorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3. RAT-el is an open source penetration test tool that allows you to take control of a windows machine.
Is it possible to run a server under a remote location?
With that being said, unless the client/zombie is actively looking and tracking open connections, it will probably be smart to run this server under a remote location if you want to stay anonymous. If this does not interest you, simply renaming zombie.exe and/or changing the assembly information using a tool will likely fool the client/zombie.
DISCLAIMER
ConTroll is for education/research purposes only. The author takes NO responsibility and/or liability for how you choose to use any of the tools/source code/any files provided. The author and anyone affiliated with will not be liable for any losses and/or damages in connection with the use of ANY files provided with ConTroll.
ConTroll - Remote Access Trojan (RAT)
Created a remote access trojan that will establish administrative control over any Windows machine it compromises.
Requirements
You NEED a 32bit OS architecture to build the binaries. So use a win 32 or unix 32 system to run and build the code
Usage
SETUP A PASTEBIN ACCOUNT, CREATE A NEW PASTE WITH THE IP ADDRESS AND THE PORT NUMBER YOU WANT THE CLIENT TO SEND RESPONSES TO. THE IP ADDRESS AND PORT NUMBER SHOULD BE SEPERATED BY A COLON LIKE THIS 192.168.12.14:5000.