To discuss, get help, or test our project, join our Discord server by clicking the link below:
This project is developed for educational purposes only. The aim is to understand and demonstrate the security risks associated with RAT (Remote Access Trojan) software and to encourage the development of effective countermeasures. The author(s) of this project do not endorse any malicious use of the materials provided.
By using or interacting with this software in any way, you agree to use it solely for educational, ethical hacking, and security research purposes. It is strictly forbidden to use the software for illegal activities, and the author(s) will not be responsible for any misuse of the software.
All users are encouraged to report any vulnerabilities or security issues found within this software to the author(s) for improvement. Remember, unauthorized access to computer systems is illegal and punishable by law. Always conduct your security research within legal boundaries and with proper authorization.
Use this software at your own risk.
- Security Risk Demonstration: Showcases the threats posed by RATs.
- Cybersecurity Awareness: Educates users on good security practices.
- RESTful API: Provides an easy-to-use interface for integration and testing.
- Python 3.12+
- MySQL
- OpenSSL
pip install -r requirements.txt
To generate a self-signed certificate, run the following commands:
openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -days 365 -nodes
To run the server with the certificate, run the following command:
flask run --host=0.0.0.0 --port=5000 --cert=cert.pem --key=key.pem
To create the database and tables, run the following commands:
flask db init
flask db migrate -m "Initial migration."
flask db upgrade
To create a new migration, run the following commands:
flask db migrate -m "Description des modifications"
flask db upgrade
To compile the client, run the following command:
cd client
pyinstaller --onefile --noconsole --icon=logo.ico client.py
The following commands are to be executed in PowerShell !
To generate a self-signed certificate .exe file, run the following command:
New-SelfSignedCertificate -Type CodeSigningCert -Subject "CN=MySelfSignedCert" -KeySpec Signature -CertStoreLocation "Cert:\CurrentUser\My"
$mypwd = ConvertTo-SecureString -String "password" -Force -AsPlainText
This command will return a thumbprint, copy it and replace it in the following command:
Export-PfxCertificate -Cert "Cert:\CurrentUser\My\<thumbprint>" -FilePath "C:\Users\PC\Desktop\mycert.pfx" -Password $mypwd
Then, click here to download Windows SDK which contains signtool.exe: Windows SDK
Finally, run the following command:
signtool sign /f "C:\Users\PC\Desktop\mycert.pfx" /p "password" /tr "http://timestamp.digicert.com" /td SHA256 /fd SHA256 /v "C:\path\to\client.exe"
For contribution guidelines, please see CONTRIBUTING.md.
This project is licensed under the MIT License. See the LICENSE file for details.