XWORM 5.6
--SPECIFICATIONS--
Remote Desktop – Control and view the target’s desktop in real-time.
File Manager – Access, upload, download, and delete files on the target system.
Process Manager – Monitor, start, and terminate processes on the target.
Keylogger – Record keystrokes entered on the target device.
Password Recovery – Retrieve saved credentials from browsers and applications.
Remote Shell – Execute system commands on the target.
Clipboard Access – View and modify the clipboard content on the target.
Screen Capture – Take periodic screenshots of the target’s display.
Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
Network Information – Gather information about the target’s network connections.
Persistence – Ensure the RAT remains active after reboots.
DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
Power Options – Reboot, shut down, or lock the target system remotely.
Anti-VM Detection – Bypass virtual machine environments for evading detection.
System Information – Collect hardware and software information from the target.
-
Download:
Remote Desktop – Control and view the target’s desktop in real-time.
File Manager – Access, upload, download, and delete files on the target system.
Process Manager – Monitor, start, and terminate processes on the target.
Keylogger – Record keystrokes entered on the target device.
Password Recovery – Retrieve saved credentials from browsers and applications.
Remote Shell – Execute system commands on the target.
Clipboard Access – View and modify the clipboard content on the target.
Screen Capture – Take periodic screenshots of the target’s display.
Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
Network Information – Gather information about the target’s network connections.
Persistence – Ensure the RAT remains active after reboots.
DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
Power Options – Reboot, shut down, or lock the target system remotely.
Anti-VM Detection – Bypass virtual machine environments for evading detection.
System Information – Collect hardware and software information from the target.
-
Download: