• Внимание! В разделе большое количество не проверенных программ. Мы не рекомендуем использовать их на основном ПК, без предварительной проверки.

JasonM22

Новорег
1
0
15 Апр 2026
njRAT v0.8.0 LIME EDITION

njRAT-v0.8.0-LIME-EDITION.png



Brief Introduction

njRAT (also known as Bladabindi) is a notorious Remote Access Trojan (RAT) that first appeared in 2012. Developed using the Microsoft .NET framework, it allows an attacker to take complete remote control of a victim's Windows computer.

Key Features

Ransomware Module: It can encrypt files on the victim's machine using AES-256 encryption, appending the .lime extension to files and demanding a ransom.

Cryptocurrency Grabber: It specifically monitors the system for Bitcoin and other digital wallets. It can track processes to steal credentials when a user buys, sells, or transfers crypto.

USB Spreader: It has a "worm" capability that allows it to automatically copy itself to any USB flash drive inserted into the infected computer, creating hidden shortcuts to trick other users into running it.

DDoS Capabilities: It includes tools to launch network attacks, such as Slowloris (which holds web server connections open to crash them) and ARME (which targets server memory).


Virus Total Scan Result

Download Link


 

lucas1056

Новорег
5
0
8 Май 2026
njRAT v0.8.0 LIME EDITION

Посмотреть вложение 72436


Brief Introduction

njRAT (also known as Bladabindi) is a notorious Remote Access Trojan (RAT) that first appeared in 2012. Developed using the Microsoft .NET framework, it allows an attacker to take complete remote control of a victim's Windows computer.

Key Features

Ransomware Module: It can encrypt files on the victim's machine using AES-256 encryption, appending the .lime extension to files and demanding a ransom.

Cryptocurrency Grabber: It specifically monitors the system for Bitcoin and other digital wallets. It can track processes to steal credentials when a user buys, sells, or transfers crypto.

USB Spreader: It has a "worm" capability that allows it to automatically copy itself to any USB flash drive inserted into the infected computer, creating hidden shortcuts to trick other users into running it.

DDoS Capabilities: It includes tools to launch network attacks, such as Slowloris (which holds web server connections open to crash them) and ARME (which targets server memory).


Virus Total Scan Result

Download Link
  • Very detailed explanation, it helped me understand the concept fully.