Skip to content

5.3.1

Compare
Choose a tag to compare
@tiffm111 tiffm111 released this 21 Dec 02:01
· 5 commits to main since this release
91232dc

Dark_Comet_Logo_Landscape-1024x545-4017142324

The following list is not exhaustive but is the critical one that makes it a dangerous tool. Many of these are used to take over a system and allow clients complete access when granted through UAC.

Spying Capabilities:

This allows you to spy on various devices. It installs with a very stealthy method and does not take many system resources. This keeps it hidden from security solutions or any suspicions from the user. It can read messages, check for any files, and read messages from any chat apps like Messenger or WhatsApp for desktop. You can also do this for Android devices using AndroRAT App.

Network Capabilities:

This transforms DarkComet into a completely different tool. It has all of the features that other utilities like Wireshark have to offer.

On-system Capabilities:

Once it infects the victim with the RAT you have control over 95% of the data on the desktop. It allows you to see all processes running, access command-prompt, files, and other folders.

Server Capabilities:

It also works across a variety of server operating systems. This includes Linux, Windows Server 2016, and Windows Server 2019.

Remote chat for chatting with other administrators.
Microsoft reader to help you open PDF and Word documents.
Fun manager.