Skip to content

The S-500 G2 Rat Hvnc stands as a pinnacle of remote administration tools, complemented by its advanced Hvnc capabilities.

License

Notifications You must be signed in to change notification settings

Mykhis/S500-RAT-HVNC-HAPP-HIdden-BROWSER-HRDP-REVERSE-PROXY-CRYPTO-MONITOR

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

S-500 HVNC

The S-500 G2 Rat HVNC is a top remote administration tool with advanced HVNC features. It supports 20 hidden browsers, working in a secret desktop environment to launch multiple browsers by duplicating user profiles. This process is entirely invisible to the user. S-500 also works with applications like Outlook, FoxMail, and Thunderbird while staying hidden.

How to Compiling

  • Download the project to your computer as zip
  • Extract Project to Folder.
  • Make Sure You Have Visual Studio Installed on Your Computer
  • Click if Visual Studio is Not Installed
  • Open the solution file (.sln).
  • Select Build Solution from the Build menu to compile the project.
  • When the build is complete, select Start Without Debugging from the Debug menu to run the project.

FAQs

What is Hidden VNC? Hidden VNC lets you control your computer without showing any activity on the main desktop. It creates a new hidden desktop environment.
Can intermediate users use this software? Yes, even users with moderate skills can use it easily by pressing a virtual button.
What can I do with Hidden VNC? You can secretly control your remote computer without showing any activity on the main desktop.
Is this software compatible with all versions of Windows? Yes, it works with all versions of Windows, both 32-bit and 64-bit, except Windows XP and Vista.

Key Features

  • Password Recovery: Recover passwords from various browsers.
  • Hidden Applications: Operate hidden applications including Edge, Chrome, Brave, Firefox, and HVNC.

Features

  • Profile Replication
  • Hidden Workstation Interface
  • Covert Web Browsers:
    • Chrome
    • Chromodo
    • SlimJet
    • Sputnik
    • Avast Browser
    • UC Browser
    • Atom Browser
    • Opera Neon
    • Firefox
    • Edge
    • Brave
    • Palemoon
    • Waterfox
    • Opera
    • 360 Browser
    • Comodo Dragon
    • Internet Explorer
    • Explorer
    • Powershell
    • Command Prompt (CMD)
  • Email Clients:
    • Outlook
    • Thunderbird
    • Foxmail
  • Password Retrieval for HVNC/HVNC browser instances
  • HRDP/HRDP browser instances/Wallets
  • Reverse Proxy
  • UAC Exploit for Windows 11/10/8.1/7
  • Remote Workstation Interface
  • Remote Visual Feed
  • Remote Sound Capture
  • Remote Registry Editor
  • Remote Command Interface
  • Covert Execution
  • File Management (download, compress, decompress)
  • Windows Defender Suppression
  • Execution on Connection Mandates
  • Recovery for All Chrome-based Browsers
  • Recovery for All Firefox-based Browsers
  • Log Retrieval & Dispatch to Discord
  • Startup or Scheduled Task Initiation
  • Resource Extraction Tool
  • Surveillance Tool
  • Task Manager Disabler
  • System Crash Simulation
  • UAC Manipulation on Invocation
  • Task Manager Sentry
  • Shell Code Conversion
  • Merged Encryption
  • Launch Portable Executable (PE)
  • Obfuscation for Evasion

Supported Browsers and Tools

  • Enhanced with WebGL Technology
  • Hidden Desktop Functionality
  • Internal Copy/Paste Mechanism
  • Secure Connectivity with Encryption
  • Built-in File Management
  • Compatible with C#/C++
  • Works with Crypter for Security
  • IPV4/DNS Synergy for Communication
  • Exclusive WD Exemption
  • Premium Support
  • Browser Profile Emulation
  • Process Suspension
  • Robust File Management (Downloads, Uploads, Creation, Deletion, Exploration, Execution)
  • Reverse Connections
  • Hidden Longevity & Boot-time Influence
  • Random Mutex for Concealment
  • Two-Factor Authentication Recovery Circumvention
  • Reflective Stub Injection
  • RunPE Integration in Stub
  • Process Interruption for Tasks
  • Scripted Downloads and Executions via Powershell
  • Windows Defender Bypass
  • Secured Communication Channel
  • Selective Browser Termination
  • Efficient Binding Mechanism
  • Remote Clipboard Extraction
  • Lightweight TCP Server
  • UAC Exploit for Elevation
  • Browser Profile Replication
  • Command Prompt and Powershell Access
  • Compact Stub (Approx. 130 KB)
  • Visual Quality and Image Size Adjustment for HVNC
  • Code Obfuscation for Protection
  • Support for Image Formats
  • Chosen Mutex for Stability
  • Compatibility with Many Web Browsers and Email Clients
  • Mass Disconnection Management
  • Precise Digital Footprint Logging

Preview

s500 features s500 main

Disclaimer

This source code is for educational purposes only.

License

This project is licensed under the MIT. For more information, see the License.