DiscordRAT is a Discord Remote Administration Tool fully written in Python3. This is a RAT controlled over Discord with over 20 post exploitation modules.
Setup Guide
You will first need to register a bot with the Discord developper portal and then add the bot to the server that you want. Once the bot is created copy the token of your bot and paste it at line 18 if you use the WithCV or line 17 if you choose the WithoutCV .
Now on go on discord , go to the settings , go to appearance , scroll to the bottom , and activate “Developer Mode”,now go to the server where your bot added right click on the channel where you want the bot to post , click copy ID and finally , paste the channel ID (not server ID) in the parenthesis in line 97 if you use the NoCV or line 67 if you use the WithCV.
Install requirements (“pip3 install -r requirements.txt”)
Then if steps above were successful after launching the python file, or executable , it will post a message on the server with a generated uuid , all that is left to do is posting “!interact ” with the given uuid.
Now your bot should be available to use !
Requirements
Compiling to exe (optional)
Advice
If you have problems with the installation of win32api or other modules , try installing it in a python virtual environment. There are two python files one has opencv and webcam related modules the other does not, this has been done because open-cv adds multiple dozens of megabytes to the compiled .exe file.
Also Read – Exegol : A Kali Light Base With Few Useful Additional Tools
Disclaimer
This tool is for educational use only, the author will not be held responsible for any misuse of this tool. This is my first project on github as such this project is far from perfect , I will listen to any criticism as long as it is constructive.
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…