NeptuneRAT is an advanced remote access tool (RAT) with a beautiful visual interface.
Peculiarities:
Control Options
Information: Retrieve system information.
Control
Capture the victim's screen.
Listen to the victim's microphone.
Monitor what the victim is listening to.
Access the victim's webcam.
Run File
Upload and execute files from the disk.
Execute files from a direct URL link.
Open URL
Open a URL on the victim's system (hidden or visible).
RemoteShell: Execute commands remotely.
File Manager: Manage files on the victim's machine.
Process Manager: Monitor and control running processes.
Fun Features
Execute pranks on the victim, such as:
Deploying an MBR virus.
Displaying GDI effects on the victim's screen.
Grabber
Extract sensitive information:
Chrome passwords.
Firefox passwords.
Discord tokens.
Windows Defender Management
Add exclusions for your file.
Disable Windows Defender entirely.
UAC Bypass
Perform UAC bypass using Cmstp.
Request elevated privileges.
KeyLogger
Log keystrokes from the victim's device.
Ransomware
Encrypt the victim's files with ransomware functionality.
DDOS
Perform distributed denial-of-service attacks.
Registry Management
Modify the victim's registry settings.
Location Tracking
Retrieve the victim's location.
System Control
Shut down the victim's machine.
Restart the victim's machine.
download:
Peculiarities:
Control Options
Information: Retrieve system information.
Control
Capture the victim's screen.
Listen to the victim's microphone.
Monitor what the victim is listening to.
Access the victim's webcam.
Run File
Upload and execute files from the disk.
Execute files from a direct URL link.
Open URL
Open a URL on the victim's system (hidden or visible).
RemoteShell: Execute commands remotely.
File Manager: Manage files on the victim's machine.
Process Manager: Monitor and control running processes.
Fun Features
Execute pranks on the victim, such as:
Deploying an MBR virus.
Displaying GDI effects on the victim's screen.
Grabber
Extract sensitive information:
Chrome passwords.
Firefox passwords.
Discord tokens.
Windows Defender Management
Add exclusions for your file.
Disable Windows Defender entirely.
UAC Bypass
Perform UAC bypass using Cmstp.
Request elevated privileges.
KeyLogger
Log keystrokes from the victim's device.
Ransomware
Encrypt the victim's files with ransomware functionality.
DDOS
Perform distributed denial-of-service attacks.
Registry Management
Modify the victim's registry settings.
Location Tracking
Retrieve the victim's location.
System Control
Shut down the victim's machine.
Restart the victim's machine.
download: