AidenWyatt04
Registered
		
Features:
- Keylogger: Captures keystrokes to steal sensitive information like passwords.
 - Clipper: Replaces cryptocurrency wallet addresses in the clipboard to redirect funds.
 - Screenshot Stealer: Captures screenshots of the victim's device.
 - File Stealer: Extracts files such as photos, documents, and text files from the victim's device.
 - Download and Execute (Loader): Downloads and runs malicious files or payloads on the infected system.
 - Device Information Gathering: Collects details like PC name, operating system, firewall status, RAM, antivirus software, and processor information.
 - Location and Address Retrieval: Obtains the geographical location and IP address of the victim.
 - Browser Data Clearing: Clears cookies and sessions from 20 browsers, including Google Chrome, Mozilla Firefox, Opera, and Yandex.
 - Anti-Sandbox Protection: Evades detection by tools like Wireshark, Process Hacker, TCPView, VirtualBox, and Sandboxie.
 - Web Panel Features:
- Dynamic and Responsive Pages: Accessible from mobile devices for ease of use.
 - Home Page: Displays all bots, counters for keylogger reports and screenshots, and details like HWID, country IP, online/offline status, and last seen.
 - Settings Page: Allows customization of operational timing and activation of file-stealing features.
 - Tasks Page: Enables adding or deleting tasks, such as downloading and executing files.
 - User Page: Facilitates changing user information for the botnet operator.
 
 




