Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/mysterscat/icarus-hvnc

Remote Administration Either you are a private user wanting to control your PC from afar, or a big company which wants to administrate hundreds of machines from a single computer,
https://github.com/mysterscat/icarus-hvnc

backdoor hvnc hvnc-cracked hvnc-download hvnc-malware hvnc-rat hvnc-source-code malware rat remote-acces-tool remote-access-tool remote-access-trojan remote-access-trojan-tool remote-control reverse-shell socket tool windows

Last synced: 24 days ago
JSON representation

Remote Administration Either you are a private user wanting to control your PC from afar, or a big company which wants to administrate hundreds of machines from a single computer,

Awesome Lists containing this project

README

        

# ICARUS HVNC

Icarus Enshrouded Workstation offers a simple, user-friendly interface. All operations are done within the hidden workstation. Features include keylogging, clipboard surveillance, geolocation tracking, web browser activities, application manipulation, system configurations, and starting mstsc.exe (Remote Desktop Protocol). This exceptional HVNC (Hidden Virtual Network Computing) is unique due to its many features. It supports hidden platforms like Discord, Telegram, Skype, DingTalk, and more.

## How to Compiling

- Download the project to your computer as zip
- Extract Project to Folder.
- Make Sure You Have Visual Studio Installed on Your Computer
- [Click if Visual Studio is Not Installed](https://visualstudio.microsoft.com/en/thank-you-downloading-visual-studio/?sku=Community&channel=Release&version=VS2022&source=VSLandingPage&passive=false&cid=2030)
- Open the solution file (.sln).
- Select **Build Solution** from the **Build** menu or press `Ctrl+Shift+B` to compile the project.
- When the build is complete, select **Start Without Debugging** from the **Debug** menu or press `Ctrl+F5` to run the project.

## Questions & Answers

What is Concealed VNC?
Concealed VNC is used by advanced users to control a computer without interacting with the main desktop. It creates a hidden desktop environment.

Can intermediate users use this software?
Yes, the software is designed for intermediate users. With a simple click, you can control your computer.

What can I do with it?
With Veiled VNC, you can silently interface with your remote computer without any intrusive pop-ups.

Is this application compatible with all versions of Windows?
Yes, it works with all versions of Windows, both 32-bit and 64-bit, except Windows XP and Vista.



## Which Browsers does it work on?
![icons8-chrome-48](https://user-images.githubusercontent.com/107614511/209736395-3071a3c4-1eb4-4c76-b6ad-dab9dbe82b03.png)
![icons8-brave-web-browser-48](https://user-images.githubusercontent.com/107614511/209736360-8bfe2757-fbab-4751-9a0d-82d80d8aefd5.png)
![icons8-microsoft-edge-48](https://user-images.githubusercontent.com/107614511/209736431-7890ed96-b611-4f4a-81a6-aa7ed1fe66b5.png)
![icons8-firefox-48](https://user-images.githubusercontent.com/107614511/209736466-d23743ca-156b-48e7-86d2-b83f2df1d298.png)
![icons8-vivaldi-web-browser-48](https://user-images.githubusercontent.com/107614511/209736487-77955215-7b23-4254-ba01-208cab60f2f0.png)
![icons8-opera-48](https://user-images.githubusercontent.com/107614511/209736494-a1421533-d1e0-4b1b-86e0-d5efa6b065dc.png)

## Functionalities: Enhance Your Capabilities

- **Two-Factor Authentication Handling**
- **WebGL Integration**
- **Secure Channel Creation**
- **Native Crypter Integration**
- **Networking Framework Version 2 Support**
- **Networking Framework Version 4 Support**
- **Process Monitoring**
- **Anti-Debugging Features**
- **False :pgon Integration**
- **Clipboard Extraction**
- **Export as .bat File**
- **Export as .bin File**
- **Initiate and End Operations**
- **Rootkit HVNC Management**
- **Telegram Surveillance**
- **Discord Surveillance**
- **Advanced Password Recovery**
- **File Retrieval**
- **Anti-VM Detection**
- **Export as Macro Script**
- **Keystroke Logging**
- **Whitelist Directory Exclusion**
- **Customer Support**
- **Profile Duplication**
- **Bidirectional Communication**
- **Reflective Stub Integration**
- **RunPE Capability**
- **Secured Communication Channel**
- **Efficient TCP Server**
- **Data Encryption (XOR/AES)**
- **Export as .vbs File**
- **Geolocation Accuracy**

## Project Construction and Export Options

**Design and Build: Set Up Your Project**

- Custom Icon
- Export as .bin File
- Specify Directory
- Define File Name
- Configure Port
- Set IP/Domain Name
- Monitoring Setup
- Startup/Task Configuration
- Define Identifier
- Integrate Rootkit

**Export Formats: Choose Your Option**

- AMSI Bypass
- ETW Evasion
- API Decoupling
- .NET Framework 2.0 Compatibility
- .NET Framework 4.0 Compatibility
- Embedded Shellcode
- Batch Scripting
- Executable (EXE) Format
- Visual Basic for Applications (VBA)
- Visual Basic Script (VBS)

## Overview

![ezgif-4-6220490b84](https://user-images.githubusercontent.com/107614511/209742199-b5a8d5ed-39d0-44fa-8e28-610f446cc828.gif)

## Disclaimer

This source code is for educational purposes only. It's created to explore reverse engineering without impacting other gamers' experiences.

## License

This project is licensed under the MIT. For more information, see the [License](LICENSE).