Sorillus Rat V6.1 (UPDATE)

Currently reading:
 Sorillus Rat V6.1 (UPDATE)

shccrew

Member
LV
1
Joined
Apr 14, 2023
Threads
24
Likes
106
Awards
5
Credits
17,820©
Cash
0$


Link:
PREVIEW SORILLUS

Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

What is Sorillus Rat?
Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported.

Features
System:

•Pop-up: Display pop-up messages on the victims' screen.
•Clipboard: Access and manage the victim's clipboard contents.
•Open URL: Open a specified URL on the victim's browser.
•Show IP: Retrieve and display the victim's IP address.
•Report: Generate and send reports regarding system status and activities.
•Shutdown: Remotely shut down the victim's system.

Surveillance:
•Screenshot: Capture screenshots of the victim's screen.
•Remote desktop: View and control the victim's desktop remotely.
•Remote cam: Access and view the victim's webcam remotely.
•Remote microphone: Listen to audio from the victim's microphone remotely.
•Key logger: Record and monitor keystrokes on the victim's system.

Fun:
•Play sound: Play customized sounds on the victim's system.
•Black screen: Turn the victim's screen black for privacy or focus purposes.
•Image walk: Display a series of images in a slideshow format.

Contact:
•Text-Chat: Engage in text-based communication with the victim.
Custom:

•Alias: Assign customized aliases or names to victims for easier identification.
•Notes: Add and manage personal notes or annotations for each victim.

Debug:
•Thread: Monitor and manage threads within the application.
•Instances: Track and manage multiple instances of the application.

Advanced Controls:
•Remote Shell: Execute remote commands on the victim's system.
•File Manager: Access and manage files and directories on the victim's system.
•Processes: View and manage running processes on the victim's system.
•Password Recovery: Recover passwords from supported browsers.
•Plugins: Extend the functionality of the application with custom plugins.
•Close Views: Close specific views or modules within the application.

Installation:
•Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps.
•Update Client: Update the victim's payload to the latest version.
•Uninstall & Disconnect: Remove the client software and disconnect from the system.

Connection:

•Reconnect: Reconnect a connection with a previously connected victim.
•Disconnect: Disconnect the connection with a victim.
 
  • Like
  • Haha
Reactions: mehrdadajbbb, OriginalURL, avci4430 and 1 other person

qsdsq

Member
LV
3
Joined
Sep 29, 2021
Threads
10
Likes
50
Awards
7
Credits
6,566©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***
View attachment 99925
Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

What is Sorillus Rat?
Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported.

Features
System:

•Pop-up: Display pop-up messages on the victims' screen.
•Clipboard: Access and manage the victim's clipboard contents.
•Open URL: Open a specified URL on the victim's browser.
•Show IP: Retrieve and display the victim's IP address.
•Report: Generate and send reports regarding system status and activities.
•Shutdown: Remotely shut down the victim's system.

Surveillance:
•Screenshot: Capture screenshots of the victim's screen.
•Remote desktop: View and control the victim's desktop remotely.
•Remote cam: Access and view the victim's webcam remotely.
•Remote microphone: Listen to audio from the victim's microphone remotely.
•Key logger: Record and monitor keystrokes on the victim's system.

Fun:
•Play sound: Play customized sounds on the victim's system.
•Black screen: Turn the victim's screen black for privacy or focus purposes.
•Image walk: Display a series of images in a slideshow format.

Contact:
•Text-Chat: Engage in text-based communication with the victim.
Custom:

•Alias: Assign customized aliases or names to victims for easier identification.
•Notes: Add and manage personal notes or annotations for each victim.

Debug:
•Thread: Monitor and manage threads within the application.
•Instances: Track and manage multiple instances of the application.

Advanced Controls:
•Remote Shell: Execute remote commands on the victim's system.
•File Manager: Access and manage files and directories on the victim's system.
•Processes: View and manage running processes on the victim's system.
•Password Recovery: Recover passwords from supported browsers.
•Plugins: Extend the functionality of the application with custom plugins.
•Close Views: Close specific views or modules within the application.

Installation:
•Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps.
•Update Client: Update the victim's payload to the latest version.
•Uninstall & Disconnect: Remove the client software and disconnect from the system.

Connection:

•Reconnect: Reconnect a connection with a previously connected victim.
•Disconnect: Disconnect the connection with a victim.
tyyyyy
 

tmtm1441

Member
LV
0
Joined
Jul 15, 2023
Threads
10
Likes
0
Awards
2
Credits
471©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***
View attachment 99925
Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

What is Sorillus Rat?
Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported.

Features
System:

•Pop-up: Display pop-up messages on the victims' screen.
•Clipboard: Access and manage the victim's clipboard contents.
•Open URL: Open a specified URL on the victim's browser.
•Show IP: Retrieve and display the victim's IP address.
•Report: Generate and send reports regarding system status and activities.
•Shutdown: Remotely shut down the victim's system.

Surveillance:
•Screenshot: Capture screenshots of the victim's screen.
•Remote desktop: View and control the victim's desktop remotely.
•Remote cam: Access and view the victim's webcam remotely.
•Remote microphone: Listen to audio from the victim's microphone remotely.
•Key logger: Record and monitor keystrokes on the victim's system.

Fun:
•Play sound: Play customized sounds on the victim's system.
•Black screen: Turn the victim's screen black for privacy or focus purposes.
•Image walk: Display a series of images in a slideshow format.

Contact:
•Text-Chat: Engage in text-based communication with the victim.
Custom:

•Alias: Assign customized aliases or names to victims for easier identification.
•Notes: Add and manage personal notes or annotations for each victim.

Debug:
•Thread: Monitor and manage threads within the application.
•Instances: Track and manage multiple instances of the application.

Advanced Controls:
•Remote Shell: Execute remote commands on the victim's system.
•File Manager: Access and manage files and directories on the victim's system.
•Processes: View and manage running processes on the victim's system.
•Password Recovery: Recover passwords from supported browsers.
•Plugins: Extend the functionality of the application with custom plugins.
•Close Views: Close specific views or modules within the application.

Installation:
•Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps.
•Update Client: Update the victim's payload to the latest version.
•Uninstall & Disconnect: Remove the client software and disconnect from the system.

Connection:

•Reconnect: Reconnect a connection with a previously connected victim.
•Disconnect: Disconnect the connection with a victim.
teest
 

amazonade6

Member
LV
3
Joined
Jul 23, 2021
Threads
10
Likes
43
Awards
7
Credits
12,452©
Cash
5$


Link:
*** Hidden text: cannot be quoted. ***
View attachment 99925
Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

What is Sorillus Rat?
Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported.

Features
System:

•Pop-up: Display pop-up messages on the victims' screen.
•Clipboard: Access and manage the victim's clipboard contents.
•Open URL: Open a specified URL on the victim's browser.
•Show IP: Retrieve and display the victim's IP address.
•Report: Generate and send reports regarding system status and activities.
•Shutdown: Remotely shut down the victim's system.

Surveillance:
•Screenshot: Capture screenshots of the victim's screen.
•Remote desktop: View and control the victim's desktop remotely.
•Remote cam: Access and view the victim's webcam remotely.
•Remote microphone: Listen to audio from the victim's microphone remotely.
•Key logger: Record and monitor keystrokes on the victim's system.

Fun:
•Play sound: Play customized sounds on the victim's system.
•Black screen: Turn the victim's screen black for privacy or focus purposes.
•Image walk: Display a series of images in a slideshow format.

Contact:
•Text-Chat: Engage in text-based communication with the victim.
Custom:

•Alias: Assign customized aliases or names to victims for easier identification.
•Notes: Add and manage personal notes or annotations for each victim.

Debug:
•Thread: Monitor and manage threads within the application.
•Instances: Track and manage multiple instances of the application.

Advanced Controls:
•Remote Shell: Execute remote commands on the victim's system.
•File Manager: Access and manage files and directories on the victim's system.
•Processes: View and manage running processes on the victim's system.
•Password Recovery: Recover passwords from supported browsers.
•Plugins: Extend the functionality of the application with custom plugins.
•Close Views: Close specific views or modules within the application.

Installation:
•Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps.
•Update Client: Update the victim's payload to the latest version.
•Uninstall & Disconnect: Remove the client software and disconnect from the system.

Connection:

•Reconnect: Reconnect a connection with a previously connected victim.
•Disconnect: Disconnect the connection with a victim.
tryyyyyyy
 

proxy3200

Member
LV
1
Joined
Jul 28, 2023
Threads
13
Likes
8
Awards
4
Credits
796©
Cash
0$


Link:
*** Hidden text: cannot be quoted. ***
View attachment 99925
Sorillus is Remote Access Trojan written in Java, that means that Server and Client is running on all operating systems (e.g. Windows, Linux, Mac).

What is Sorillus Rat?
Sorillus is a platform-independent R.A.T (Remote Access Trojan) written in Java, that can help a pentester to get full remote access to any device that can run Java. This rat can infect Linux devices as well as mac os and other os like widows. their developer is planning to make a new version that can hack android as well so its not just a cross-platform rat its stub is also cross-platform supported.

Features
System:

•Pop-up: Display pop-up messages on the victims' screen.
•Clipboard: Access and manage the victim's clipboard contents.
•Open URL: Open a specified URL on the victim's browser.
•Show IP: Retrieve and display the victim's IP address.
•Report: Generate and send reports regarding system status and activities.
•Shutdown: Remotely shut down the victim's system.

Surveillance:
•Screenshot: Capture screenshots of the victim's screen.
•Remote desktop: View and control the victim's desktop remotely.
•Remote cam: Access and view the victim's webcam remotely.
•Remote microphone: Listen to audio from the victim's microphone remotely.
•Key logger: Record and monitor keystrokes on the victim's system.

Fun:
•Play sound: Play customized sounds on the victim's system.
•Black screen: Turn the victim's screen black for privacy or focus purposes.
•Image walk: Display a series of images in a slideshow format.

Contact:
•Text-Chat: Engage in text-based communication with the victim.
Custom:

•Alias: Assign customized aliases or names to victims for easier identification.
•Notes: Add and manage personal notes or annotations for each victim.

Debug:
•Thread: Monitor and manage threads within the application.
•Instances: Track and manage multiple instances of the application.

Advanced Controls:
•Remote Shell: Execute remote commands on the victim's system.
•File Manager: Access and manage files and directories on the victim's system.
•Processes: View and manage running processes on the victim's system.
•Password Recovery: Recover passwords from supported browsers.
•Plugins: Extend the functionality of the application with custom plugins.
•Close Views: Close specific views or modules within the application.

Installation:
•Add Autostart: Add payload to the auto start folder so it will automatically start with startup apps.
•Update Client: Update the victim's payload to the latest version.
•Uninstall & Disconnect: Remove the client software and disconnect from the system.

Connection:

•Reconnect: Reconnect a connection with a previously connected victim.
•Disconnect: Disconnect the connection with a victim.
Ok thanks
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips

Similar threads

Top Bottom