paradoxiaRAT - Native Windows Remote Access Tool

paradoxiaRAT – Native Windows Remote Access Tool

Paradoxia Remote Access Tool. 

Features

Paradoxia Console


FeatureDescription
Easy to useParadoxia is extremely easy to use, So far the easiest rat!
Root Shell
Automatic Client buildBuild Paradoxia Client easily with or without the icon of your choice.
MultithreadedMultithreaded Console server, You can get multiple sessions.
Toast NotificationsDesktop notification on new session
Configurable SettingsConfigurable values in paradoxia.ini
Kill SessionsKill Sessions without getting in sesssion.
View Session informationView Session information without getting in Session.

Paradoxia Client

FeatureDescription
StealthRuns in background.
Full File AccessFull access to the entire file system.
PersistenceInstalls inside APPDATA and has startup persistence via Registry key.
Upload / Download FilesUpload and download files.
ScreenshotTake screenshot.
Mic RecordingRecord Microphone.
Chrome Password RecoveryDump Chrome Passwords using Reflective DLL (Does not work on latest version)
KeyloggerLog Keystrokes and save to file via Reflective DLL.
GeolocateGeolocate Paradoxia Client.
Process InfoGet Process information.
DLL InjectionReflective DLL Injection over Socket, Load your own Reflective DLL, OR use ones available here.
Power offPower off the Client system.
RebootReboot the client system.
MSVC + MINGW SupportVisual studio project is also included.
Reverse ShellStable Reverse Shell.
Small ClientMaximum size is 30kb without icon.

Installation (via APT)

$ git clone https://github.com/quantumcored/paradoxia
$ cd paradoxia
$ sudo ./install.sh

Example Usage :

  • Run Paradoxia
sudo python3 paradoxia.py
  • Once in paradoxia Console, The first step would be to build the Client, Preferrably with an Icon.

 

  • After that’s built, As you can see below it is detected by Windows Defender as a severe malware. Which is expected since it IS malware.

 

  • I’m going to transfer the client on a Windows 10 Virtual machine and execute it. After Executing it, It appears under Startup programs in task manager.

 

  • Also it has copied itself inside Appdata directory and installed under the name we specified during build.

 

  • At the same time, I get a session at server side.

  • First thing I’d do is get in the session and view information.

 

  • There are plenty of things we can do right now, but for example only, I will demonstrate keylogging.

 

You can see in the image above that It says it successfully injected dll, And in file listing there is a file named log.log, Which contains the logged keystrokes.

  • Lets view captures keystrokes.

Changelogs

  • This repository was home to 3 tools previously, Iris, Thawne and Previous version of Paradoxia. This can be found here.
  • Everything is entirely changed, Client has been rewritten, Infodb removed. Much new features added. Stability added.

Developer

Hi my name’s Fahad. You may contact me, on Discord or My Website

Leave a Reply

Your email address will not be published. Required fields are marked *

Special Offer for Hackers!Sign up to get your $5 Coupon code, weekly deals and latest hacking tools straight to your inbox!
X