/Dokkaebi-Rat

Personal cyber sec. project aka Dokkaebi Rat

Primary LanguagePython

Dokkaebi-Rat

Personal cyber sec. project aka Dokkaebi Rat

⠀ /l、
(゚、 。 7
⠀ l、゙ ~ヽ
  じしf_, )ノ
░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░░▒▓██████▓▒░░▒▓████████▓▒░▒▓███████▓▒░░▒▓█▓▒░ 
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ 
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ 
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓███████▓▒░░▒▓███████▓▒░░▒▓████████▓▒░▒▓██████▓▒░ ░▒▓███████▓▒░░▒▓█▓▒░ 
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ 
░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░      ░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░ 
░▒▓███████▓▒░ ░▒▓██████▓▒░░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓█▓▒░░▒▓█▓▒░▒▓████████▓▒░▒▓███████▓▒░░▒▓█▓▒░
  1. Requirements:

    Python 3.x installed on your system. Required Python packages listed in requirements.txt. Install them using: ( pip install -r client_requirements.txt ) and ( pip install -r server_requirements.txt )

  2. Setting up the RAT: a. Clone or download the DOKKAEBI RAT repository from GitHub. b. Navigate to the directory where the files are located.

  3. Customizing the RAT:

    You can customize the RAT by modifying the Python script (Dokkaebi.py). Add or remove functions as needed. Modify the HOST and PORT variables to specify the IP address and port for listening.

  4. Running the RAT: a. Open a terminal or command prompt. b. Navigate to the directory where the Python script is located. c. Run the script using the following command: python Dokkaebi.py

  5. Operating the RAT:

    Once the RAT server is running, it will listen for incoming connections from clients. Connect to the server using the provided IP address and port. Use the client interface to send commands to the server. The server will execute the corresponding functions based on the received commands.

  6. Important Notes:

    Use this tool responsibly and ethically. Unauthorized access to systems is illegal. Ensure that you have permission to perform penetration testing or other security assessments. Be cautious when running commands that may cause harm to systems or violate privacy. Keep the RAT script and any generated files secure to prevent unauthorized access.

  7. Contact: For any questions or support, contact the developer at dokkaebi@fbi.ac