The most advanced cross-platform remote administration tool with 70+ modules, end-to-end encrypted communication, and an intelligent builder system.
Built on Java 8 for maximum compatibility. One codebase, native output for every platform.
java -jar) — Universal cross-platform format. Runs on any OS with Java 8+.
java -jar)
Runs completely invisible in the background. No windows, no tray icons, no traces. Full stealth operation.
java -jar)
Due to macOS security (Gatekeeper & TCC), certain modules like Screen Capture and Input Control require user-granted admin permissions.
java -jar)
Operates silently as a background process. No GUI, no desktop entries, no visible footprint on the system.
NATIVE build variants bundle a minimal auto-downloaded JRE — targets don't need Java installed. All other formats require Java 8+ on the target machine. The client bytecode is Java 8 compatible but runs on any Java version 8 and above.
A comprehensive suite of tools designed for maximum control and minimum footprint.
Full real-time desktop streaming with mouse & keyboard control. Multi-monitor support with adaptive frame rate.
Hidden Virtual Network Computing — run a full invisible desktop session. Completely undetectable to the end user.
Browse, upload, download, rename, delete files with a full GUI. Execute files remotely with a single click.
Interactive command shell with full ANSI color support. Execute commands in real-time with output streaming.
View all running processes with CPU/RAM usage. Kill, suspend, or inject into any process instantly.
Keylogger, webcam capture, microphone recording, screen capture, and clipboard monitoring — all in real-time.
Extract saved passwords from 14+ applications including browsers, email clients, FTP, VPN, and WiFi networks.
TCP Direct, TCP+SSL, HTTP, and HTTP+SSL transport modes. Switch protocols on-the-fly for maximum flexibility.
Multiple persistence mechanisms including startup entries, scheduled tasks, and registry keys. Survive reboots seamlessly.
Built-in SOCKS proxy and port forwarding. Tunnel traffic through targets and pivot across internal networks.
Every module is a precision-engineered tool. Combine them for complete operational control.
Real-time keystroke capture with window title tracking and clipboard integration.
Live screen streaming with full mouse & keyboard control and multi-monitor support.
Access device cameras for live streaming or snapshot capture.
Live audio recording from system microphone with configurable quality.
Capture full-screen or per-monitor screenshots instantly.
Hidden Virtual Network Computing — invisible desktop session with full browser & app control.
Monitor clipboard changes in real-time with history and crypto address detection.
Real-time bidirectional messaging with the connected client.
Extract saved credentials from Google Chrome including cookies and autofill data.
Recover stored passwords and cookies from Mozilla Firefox profiles.
Extract saved credentials from Microsoft Edge Chromium.
Recover Steam session tokens and account information.
Extract Discord authentication tokens from all Discord installations.
Recover saved email credentials from Microsoft Outlook.
Extract saved FTP/SFTP credentials from FileZilla.
Recover saved sessions and passwords from WinSCP.
Extract saved IM account credentials from Pidgin messenger.
Recover saved VPN credentials from OpenVPN configurations.
Extract all saved WiFi network passwords from the system.
Recover Windows and software product license keys.
Detect and extract cryptocurrency wallet files and seed phrases.
Run all credential recovery modules at once with a consolidated report.
Full task manager with CPU/RAM monitoring. Kill, suspend, or resume processes.
Complete file system browser. Upload, download, rename, delete with drag & drop.
Full Windows Registry editor with key/value creation, modification, and deletion.
Interactive command prompt with full ANSI support and real-time output.
Execute PowerShell, VBS, Batch, and Python scripts remotely.
Comprehensive hardware & software inventory with OS, CPU, GPU, RAM details.
Complete list of installed applications with version and publisher info.
Manage auto-start entries. Add, remove, or modify startup programs.
Start, stop, restart, and configure Windows services.
Create SOCKS proxy tunnels through the remote machine for network pivoting.
Forward local and remote ports through the client connection.
Discover hosts and open ports on the remote network.
Monitor all active TCP connections with process and address details.
Download files from URLs and execute them on the target machine.
Open web pages in the default browser on the remote machine.
Modify the system hosts file for DNS redirection.
Elevate privileges with multiple UAC bypass techniques.
Multiple persistence mechanisms: registry, startup folder, scheduled tasks.
Automatically replace cryptocurrency addresses in clipboard with your own.
Inject custom DLLs into running processes for code execution.
File encryption module with custom extension, wallpaper change, and decryptor.
Force Blue Screen of Death on the remote machine.
Troll features: hide taskbar, swap mouse buttons, open CD tray, rotate screen.
Disable Windows Defender real-time protection and add exclusions.
Turn off User Account Control for unrestricted execution.
Disable Windows Firewall for all network profiles.
Self-protection mechanism that monitors and restarts the client if terminated.
Shutdown, restart, sleep, lock, logoff the remote machine with a single click.
High-speed file upload and download with progress tracking and resume support.
Push updates to the client remotely without losing the connection.
Cleanly remove the client from the remote machine including persistence.
Force the client to reconnect with new settings or different server.
Retrieve client location via IP geolocation with map display.
The most advanced client builder with obfuscation, encryption, and multi-platform output.
Configure IP/Domain, port, reconnect interval, mutex, and installation path. Support for multiple hosts with failover.
Choose from TCP Direct, TCP+SSL, HTTP, or HTTP+SSL. Each mode is optimized for different network environments.
Install to AppData, hide file attributes, add to startup registry, create scheduled tasks.
Automated class & method renaming with ProGuard. Reduces binary size and makes reverse engineering extremely difficult.
AES-256 runtime string encryption using ASM bytecode manipulation. All strings are encrypted and decrypted at runtime.
Customize file description, company, copyright, version, and icon. Clone info from legitimate executables.
Bind multiple files together. Execute them alongside the client — perfect for dropping legitimate files or decoys.
Build as JAR (cross-platform), EXE (Windows), or wrapped with custom JRE for zero-dependency deployment.
Build and deploy clients for Windows, macOS, and Linux from a single server interface.
Full feature support with 70+ modules including HVNC, credential recovery, registry editor, and native EXE output.
44 modules with full surveillance, file management, remote desktop, and shell access on Apple systems.
44 modules for Linux servers and desktops with surveillance, shell access, and full network tools.
A beautiful JavaFX-powered dashboard to manage all your connections.
Handle hundreds of simultaneous connections with real-time status monitoring, country flags, and OS detection.
Each module opens in its own tab. Work with multiple modules on multiple clients simultaneously.
Schedule tasks to run automatically when clients connect. Execute modules on multiple clients at once.
Save and load builder configurations. Share profiles across team members for consistent deployments.
Desktop notifications when clients connect, disconnect, or complete tasks. Never miss an event.
Organize clients by group, country, or OS. Apply bulk operations to entire groups at once.
Reach out through any of the channels below.