https://github.com/byt3n33dl3/crawler_v2

Remote access Trojan based (Client) After the Malware hits the Kernel.

https://github.com/byt3n33dl3/crawler_v2

Science Score: 13.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (11.1%) to scientific vocabulary

Keywords

compiler crawler exploit offensive-security pentesting rat
Last synced: 5 months ago · JSON representation

Repository

Remote access Trojan based (Client) After the Malware hits the Kernel.

Basic Info
  • Host: GitHub
  • Owner: byt3n33dl3
  • License: apache-2.0
  • Language: C
  • Default Branch: main
  • Homepage:
  • Size: 43.4 MB
Statistics
  • Stars: 11
  • Watchers: 1
  • Forks: 2
  • Open Issues: 0
  • Releases: 1
Topics
compiler crawler exploit offensive-security pentesting rat
Created almost 2 years ago · Last pushed over 1 year ago
Metadata Files
Readme License Security

README

C R A W L E R v2

by: github.com/pxcs - Sulaiman
------------

Crawler_v2 is an advanced remote access tools for penetration testing on a devices, it can access real time client devices after the malware hits the kernels, very good tools for strength chacking. Penetrate a strong security systems ( even AV ) software. Crawler_v2 is a ( Remote access Trojan ) that gives the server/attacker full remote access to the user's command-line interpreter (cmd.exe). They are allowed to execute commands silently without the src/client/Crawler_v2 noticing. The server/attacker is also given the ability to download and execute files on the src/client/Crawler_v2's computer. This is also a silent and hidden process. Like most Remote Access Trojans, this download and execution ability helps distribute viruses and other pieces of malware.

This malware is distributed simply by running Crawler_v2.exe. This file name can be changed to whatever. There is no restriction. When run, it searches for the first two arguments ( IP & Port ). If neither is provided, the program doesn't run. With that being said, make sure you provide the server's IP and Port in the command-line arguments.

Bot & RCA Features

- Remote control activity
- Real time ( access )
- Penetrate the security ( bypass )
- Malware planted straight in ( root / kernels )
- Remote command execution 
- Silent background process
- Download and run file (Hidden)
- Safe Mode startup
- Will automatically connect to the server
- Data sent and received is encrypted (substitution cipher)
- Files are hidden
- Installed Antivirus shown to server
- Easily spread malware through download feature
- Startup info doesn't show in msconfig or other startup checking programs like CCleaner
- Disable Task Manager

When starting the server, it will prompt for you a listening port. This is the port that you need to use in the command-line for Crawler_v2.exe. Once you provide the port, your server information will be provided and the menu will be down. The IP address provided is your external IP. With that being said, unless the src/client/Crawler_v2 is actively looking and tracking open connections, it will probably be smart to run this server under a remote location if you want to stay anonymous. If this does not interest you, simply renaming Crawler_v2.exe and/or changing the assembly information using a tool will likely fool the src/client/Crawler_v2.

Note: This project was only made for education purposes and research only, thankyou for all the supports and sources codes

Owner

  • Name: Sulaiman
  • Login: byt3n33dl3
  • Kind: user
  • Location: Error 403: Not on earth

I N F R A X 8 6

GitHub Events

Total
  • Watch event: 1
Last Year
  • Watch event: 1

Issues and Pull Requests

Last synced: 10 months ago

All Time
  • Total issues: 0
  • Total pull requests: 8
  • Average time to close issues: N/A
  • Average time to close pull requests: less than a minute
  • Total issue authors: 0
  • Total pull request authors: 1
  • Average comments per issue: 0
  • Average comments per pull request: 0.0
  • Merged pull requests: 8
  • Bot issues: 0
  • Bot pull requests: 0
Past Year
  • Issues: 0
  • Pull requests: 0
  • Average time to close issues: N/A
  • Average time to close pull requests: N/A
  • Issue authors: 0
  • Pull request authors: 0
  • Average comments per issue: 0
  • Average comments per pull request: 0
  • Merged pull requests: 0
  • Bot issues: 0
  • Bot pull requests: 0
Top Authors
Issue Authors
Pull Request Authors
  • byt3n33dl3 (8)
Top Labels
Issue Labels
Pull Request Labels
bug (1) documentation (1) help wanted (1) enhancement (1) good first issue (1)

Dependencies

.github/workflows/django.yml actions
  • actions/checkout v3 composite
  • actions/setup-python v3 composite
docs/mingw-example/Dockerfile docker
  • builder latest build
  • cmake-builder latest build
  • meson-builder latest build
  • ubuntu 22.04 build
docs/mingw-example/docker-compose.yml docker
  • win32-builder latest
src/usr/client/Android/Studio/aFreeRDP/build.gradle maven
src/usr/client/Android/Studio/build.gradle maven
src/usr/client/Android/Studio/freeRDPCore/build.gradle maven
  • com.android.support:appcompat-v7 28.0.0 implementation
  • com.android.support:support-v4 28.0.0 implementation
  • com.android.support:support-vector-drawable 28.0.0 implementation