Disclaimer: This article is for educational and research purposes only. Do not use the information herein for illegal activities. The author is not responsible for any misuse.
Head of the seasons :
- RAT Panels
- Botnet Panels
- Stealer Panels
- Ransomware Panels
- Keylogger Panels
- Crypter / Loader Panels
- Summary
- RAT Panels :
Rat panels are also divided into several categories, including Telegram bot panels, web panels, etc. In my opinion, the best option for anonymity is the panel connected to the Telegram bot.
Because you can get a virtual number and then create a Telegram account, this way even if you get exposed, this is not your real number and you will ultimately remain hidden. And a very positive point is that you can delete your Telegram bot or Telegram account to erase your tracks. But there is a negative point that when your bot is directly connected to the Telegram bot, meaning there is no intermediary server, you cannot use encryption algorithms such as AES.
Web panel is also a good option because you can also apply your own encryption algorithms or private algorithms so that only the client and server can decrypt it. For web panel you need a host.
That does not require authentication or entering fake information when registering so that you do not get exposed. The web panel is easier than the Telegram panel because, for example, adding the option to upload and download files is simple in the web panel.
But in Telegram, because we, the country of Iran, are filtered, we have to use intermediary services to download and upload files. There is also a mobile panel. With the Flutter programming language, you can also create a panel for mobile. There are other panels, which we have mentioned the most important ones.
- Botnet Panels :
Botnet panels, like zombie control, have capabilities such as viewing the number of offline and online users and the total number of targets, sending mass commands, performing DDoS attacks, mining digital currency (Crypto Mining), releasing new malware, managing proxies and Socks, shell access, and more. If you are interested in building a botnet panel, there are many training courses on the Internet. In Python, the socket, requests libraries are used to send requests or communicate with the panel.
- Stealer Panels :
To steal information such as passwords, cookies, cryptocurrency wallets, etc. It has features such as displaying stolen information, filtering by country or software, searching and downloading data, sending alerts when new information is stolen, etc. This type of malware is written in low-level or intermediate languages such as C.
- Ransomware Panels :
This type of panel is for managing the victim's ransomware. Features: View encryption status, send decryption key, create custom version of malware, manage payments (usually Bitcoin) Have you ever been infected with ransomware? Professional ransomware has stunning performance in terms of speed and encryption algorithm, such as lockbit ransomware and ....
In the future, I want to start a project to prevent your system from being infected with ransomware using behavioral analysis methods and the Arduino board.
- Keylogger Panels :
It is used to view keyboard inputs. Features: Display type log, filter by software/website, instant screenshot, shell access, webcam access, etc. Professional keyloggers use techniques such as Process Hollowing to remain hidden, and combining keyloggers with polymorphic techniques is a very interesting idea.
- Crypter / Loader Panels :
Used to encrypt and inject malicious files or download malware to the victim's system. Features: Creating encrypted executable (exe) files, injecting into processes, managing, downloading payloads, uploading new versions, etc.
- Summary :
If you would like me to post better and more advanced content, please support us 👁️♥️ If you have any questions, please contact the ID below. Until the next article, goodbye 🫡