Logo
 
USD 917.08  CAD 1204.43  EUR 858.51  AUD 1215.36  GBP 731.47 
 

Browse Categories

Search Options

Search terms:

Listing type:

All  Fixed Price  Auction

Product type:

All  Digital  Physical

Price range:

USD  to USD

Origin country:

Ships to:

Order by:

Active vendor:

Automatic fulfillment:

Multisig options:

Bulk discounts:

In stock:

Payment type:

Cryptocurrency:

Average vendor processing:

Vendor trust level:

to

Exchange Rates

Bitcoin (BTC)

United States Dollar (USD)
917.08
 
Canadian Dollar (CAD)
1,204.43
 
Euro (EUR)
858.51
 
Australian Dollar (AUD)
1,215.36
 
British Pound (GBP)
731.47
 
Deposits & Withdrawals
 

Monero (XMR)

United States Dollar (USD)
11.66
 
Canadian Dollar (CAD)
15.32
 
Euro (EUR)
10.92
 
Australian Dollar (AUD)
15.46
 
British Pound (GBP)
9.30
 
Deposits & Withdrawals
 

The above rates are updated every 10 minutes and taken using a weighted average of major exchange platforms.

 

KilerRat v10.0.0 Full

Under the Control Tab: File Manager - Allows the attacker to delete, edit, rename, copy, paste, download, create new folders/files in addition to navigating the file system. Process Manager - Allows the attacker to list, suspend, resume, kill and kill & delete processes. Remote Desktop - Allows the attacker to start a Remote Desktop session Remote Cam - Allows the attacker to obtain access...

Sold by shonajaan - 325 sold since Mar 28, 2016  Vendor Level 5 Trust Level 6

 
Features
 
Product class
Digital goods
 
Quantity left
Unlimited
 
Ends in
Never
 
 
Features
 
Origin country
Worldwide
 
Ships to
Worldwide
 
Payment
Escrow
 
 

Purchase price: USD 2.40

Qty:  
0.0026 BTC / 0.2058 XMR

 

Product Description

Under the Control Tab:
File Manager - Allows the attacker to delete, edit, rename, copy, paste, download, create new folders/files in addition to navigating the file system.
Process Manager - Allows the attacker to list, suspend, resume, kill and kill & delete processes.
Remote Desktop - Allows the attacker to start a Remote Desktop session
Remote Cam - Allows the attacker to obtain access to the victim's system camera and display a live feed
Remote Shell - Opens a reverse shell on the victim, which allows the attacker to input commands directly on the system
Registry - Allows the attacker to manipulate the victim's system registry (create, edit, delete keys and values)
Keylogger - Enables the key logging function on the victim, logs are automatically shipped back to the C&C server.
Get Passwords - Allows the attacker to collect stored passwords in various browsers.
Under the Proxy Tab:
Victim Proxy - Allows the attacker to use the victim as a proxy for network traffic.
Restart Proxy - Restarts the proxy on the selected victim.
Send Msgbox - Allows the attacker to send a pop up text box to the victim.
Under the 'Run File’ Tab:
From Link - Allows the attacker to provide a link to a file and have it executed on the victim’s system.
From Disk - Allows the attacker to upload a file to the victim and have it executed on the victim’s system.
Script - Allows the attacker to create script that is then executed on the victim’s system.
Format System - Allows the attacker to format the victim’s system.
Under the ‘Website’ Tab:
Open Website - Opens a website of the attackers choosing.
Block Website - Blocks a website of the attackers choosing on the victim machine.
DDOS Attack - Performs a DDOS attack on a victim of the attackers choosing.
Open Chat - Opens a chat window on the victims machine.
Spread in Hard Drive
Under the ‘Computer' Tab:
Restart - Restarts the victim’s computer.
Shutdown - Shutdown the victim’s computer.
Under the ‘Server' Tab:
Update - Enables the attacker to update the malware on the victim via upload or a link
Uninstall - Allows the attacker to uninstall the malware.
Restart - Allows the attacker to restart the malware.
Close - May allows the attacker to close the malware
Disconnect - Allows the attacker to sever the connection between them.
Rename - Allows the attacker to rename the malware on the victim’s system.
Open Folder - Opens the local folder on the attackers machine where data collected from the victim’s system is stored.
Builder - Allows the attacker to build malware that will connect back to the server
No-ip - Integrated with no-ip (A Dynamic DNS Service)
Exe to convert jpg - Allows the attacker to convert an exe to a jpg, score, mp3, wav, txt mp4 or flv file.

And Much much more....

killer rat botnet hacking fraud