• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

Instructions for Using LimeRat – Hijacking Other People’s Computers

AnonyViet by AnonyViet
January 27, 2023
in Security
0

Returning to the Rat Series, today Anonyviet will bring you a Rat named the father of Rats, LimeRat, which was developed by a group of authors called NyanxCat and shared on Github. Why is it called the father of the mouse, please join me in analyzing it below.

Join the channel Telegram of the AnonyViet 👉 Link 👈

LimeRat Features

  • .NET
    • Coded in Visual Basic .NET
  • Connection
    • Use pastebin.com as ip:port, Instead of DNS noip.com
  • Plugins
    • Use a plugin system to reduce size and reduce AV detection
  • Encode
    • Communication between server and victim is encrypted with AES
  • Spreading
    • Infect all files and folders on USB drivers
  • Bypass
    • Low chance of being scanned by virus, can start with windows undetected
  • Light
    • The generated rat size is about 25KB
  • Anti-Virtual Machine
    • Self-uninstall if virtual machine to avoid scanning or analysis
  • Ransomware
    • Encrypt files on all HHDs and USBs with the .Lime . extension
  • XMR Miner
    • High Performance Monero CPU Miner with Idle User \ Operation Optimization
  • DDoS
    • Create a powerful DDOS attack to make an online service unavailable
  • Crypto Stealer
    • Stealing sensitive crypto data
  • Lock screen
    • Prevent users from accessing their Windows GUI
  • And more
    • Auto connect
    • Using RDP
    • File management
    • Steal Password
    • Remote control
    • Bitcoin Miner
    • Download File from victim
    • Keyloggers

That is just a small part of the utilities integrated into this LimeRat v0.1. The use and interface are also very simple and beautiful, making LimeRat a rat with a relatively high number of users compared to other Rats at the same time.

How to download and use LimeRat

To download you can click the link below. Remember to turn off your antivirus before doing so to avoid deleting important Rat files.

If you want to play with the Source, download it above and use it to download the Debug version to use.

Link Download Source

After downloading the Debug version successfully. You proceed to extract to the computer screen for easy operation.

Run the LimeRAT.exe file to open the tool.

Then there will be a notice board. Please add the NAT port on the modem (Key AES is nyancat)

Instructions for Using LimeRat - Hijacking Other People's Computers 5

After entering the Rat interface, go to the Builder tab and then go to the web Pastebin.com Create a new paste with the following content:

your ip:port ->> 127.0.01:8080 (example)

Instructions for Using LimeRat - Hijacking Other People's Computers 6

Then save and get the Raw url and paste it into the Pastebin Url section in LimeRat.

open port LimeRat

Adjust the parameters of Rat to suit your liking and then click Build to proceed with creating the rat.

After the victim is poisoned, you can easily control the victim at will

Instructions for Using LimeRat – Hijacking Other People’s Computers

Get data files, RDP, crypt all files of the victim with ransomware… You can do whatever you want on this LimeRat.

Good luck
TMQ.

The article achieved: 5/5 – (100 votes)

Tags: computersHijackingInstructionsLimeRatpeoples
Previous Post

How to enable God Mode on Windows 11 or Windows 10

Next Post

Summary of 8 prohibitions to never run on Linux

AnonyViet

AnonyViet

Related Posts

How to intercept traffic using Burp Suite to analyze HTTP/HTTPS
Security

How to intercept traffic using Burp Suite to analyze HTTP/HTTPS

April 18, 2026
How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Next Post
Summary of 8 prohibitions to never run on Linux

Summary of 8 prohibitions to never run on Linux

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

4K Video Downloader Plus – Tool to download YouTube videos on macOS

4K Video Downloader Plus – Tool to download YouTube videos on macOS

April 20, 2026
How to add Watermark to Google Docs to protect copyright

How to add Watermark to Google Docs to protect copyright

April 19, 2026
How to intercept traffic using Burp Suite to analyze HTTP/HTTPS

How to intercept traffic using Burp Suite to analyze HTTP/HTTPS

April 18, 2026
How to avoid Adblock detection on Youtube with 4 good tips

How to avoid Adblock detection on Youtube with 4 good tips

April 17, 2026
4K Video Downloader Plus – Tool to download YouTube videos on macOS

4K Video Downloader Plus – Tool to download YouTube videos on macOS

April 20, 2026
How to add Watermark to Google Docs to protect copyright

How to add Watermark to Google Docs to protect copyright

April 19, 2026
How to intercept traffic using Burp Suite to analyze HTTP/HTTPS

How to intercept traffic using Burp Suite to analyze HTTP/HTTPS

April 18, 2026
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

4K Video Downloader Plus – Tool to download YouTube videos on macOS

4K Video Downloader Plus – Tool to download YouTube videos on macOS

April 20, 2026
How to add Watermark to Google Docs to protect copyright

How to add Watermark to Google Docs to protect copyright

April 19, 2026
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply