• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

Currently reading:
 Source Code XWORM 6.5 Source code (1 Viewer)

Recently searched:

Adl22

Member
LV
1
Joined
Oct 21, 2024
Threads
10
Likes
7
Awards
5
Credits
1,247©
Cash
0$


Link:

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
 
  • Like
Reactions: keygroup777, Sedot, mod_king_99 and 1 other person

convik0534

Member
LV
2
Joined
Apr 14, 2023
Threads
11
Likes
38
Awards
6
Credits
14,353©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
sefsefsefsefsef
 

reahall1

Member
LV
0
Joined
Jul 29, 2025
Threads
0
Likes
0
Credits
1,077©
Cash
0$


Link:
* Hidden text: cannot be quoted. *

  • Remote Desktop – Control and view the target’s desktop in real-time.
  • File Manager – Access, upload, download, and delete files on the target system.
  • Process Manager – Monitor, start, and terminate processes on the target.
  • Keylogger – Record keystrokes entered on the target device.
  • Password Recovery – Retrieve saved credentials from browsers and applications.
  • Remote Shell – Execute system commands on the target.
  • Clipboard Access – View and modify the clipboard content on the target.
  • Screen Capture – Take periodic screenshots of the target’s display.
  • Audio and Webcam Capture – Access and record audio or video from the target’s microphone and webcam.
  • Network Information – Gather information about the target’s network connections.
  • Persistence – Ensure the RAT remains active after reboots.
  • DDoS Functionality – Utilize the target device in distributed denial-of-service (DDoS) attacks.
  • Power Options – Reboot, shut down, or lock the target system remotely.
  • Anti-VM Detection – Bypass virtual machine environments for evading detection.
  • System Information – Collect hardware and software information from the target.
норм
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom