NeptuneRAT V2.0
Features of NeptuneRAT V2.0
Monitoring (
This core surveillance feature enables live viewing of the remote system’s desktop. The controller receives a real-time screen stream, allowing observation of all on-screen activities, mouse movements, and user interactions without the target’s knowledge in malicious scenarios.
Microphone (
The tool can remotely activate the target’s microphone to capture and stream live audio. This supports eavesdropping on conversations, ambient sounds, or any audio input from connected devices, often without visual indicators on the victim machine.
Run File (
Allows the controller to execute arbitrary files on the remote system. Files can be uploaded from the controller’s side or selected from the target’s storage and launched remotely, enabling deployment of additional payloads, scripts, or applications.
Shell (
Provides unrestricted remote command-line (shell) access. The controller can run any command as if physically at the machine, including file operations, registry edits, network commands, or system configuration changes.
Sound (
Offers control over the remote system’s audio playback and output. Features include playing custom sounds, adjusting volume levels, or monitoring currently playing media, which can serve as distractions, alerts, or further surveillance.
WebCam (
Remotely activates the target’s webcam to capture and stream live video. This enables visual monitoring of the physical environment around the device, potentially without any LED indicator or user notification.
File Manager (
A full-featured remote file explorer interface. It permits browsing all directories, uploading/downloading files, creating/deleting/renaming items, copying/moving content, and performing other filesystem operations with complete access.
Process Manager (
Displays a list of all running processes on the remote system. The controller can view details, terminate (kill) processes, suspend/resume them, or start new ones, allowing interference with legitimate software or security tools.
Bypass UAC (
Automatically circumvents Windows User Account Control prompts to achieve elevated (administrator) privileges silently. This enables the RAT to perform restricted actions without triggering security warnings for the user.
Anti-Format Protection (
Prevents or hinders attempts to format drives or wipe data on the infected system. It acts as a self-preservation mechanism against user-initiated recovery or cleanup efforts.
Blocker AntiVirus (
Actively interferes with or disables installed antivirus/anti-malware software. Techniques may include process termination, signature blocking, or real-time protection disabling to avoid detection.
Delete System Restore (
Locates and permanently removes Windows System Restore points. By eliminating these recovery backups, it complicates legitimate system rollback or malware removal attempts.
Destroy (VIRUS Mode) (
Engages an aggressive destructive payload mode. This can corrupt critical system files, overwrite data, delete essential components, or trigger widespread damage resembling classic virus behavior.
Ransomware (
Includes file-encryption capabilities that lock user documents and data, followed by ransom demands (typically displayed via notes or pop-ups). It targets common file extensions and may demand cryptocurrency payments for decryption keys.
43.49 MB file on MEGA
NeptuneRAT V2.0
MediaFire is a simple to use free service that lets you put all your photos, documents, music, and video in a single place so you can access them anywhere and share them everywhere.
www.mediafire.com