I am programming an undetectable RAT. So far I made the attacker be able to run cmd commands, turn on and turn off the monitor, check if the script is ran as admin, get the saved network passwords, and check the public ip. I am planning on adding a keylogger, upload files, download files, and installing a backdoor. What else should I add?
[link] [comments]
from hacking: security in practice https://ift.tt/SvlHck4
Comments
Post a Comment