ALERT!
Click here to register with a few steps and explore all our cool stuff we have to offer!
Products

#1 Rhadamanthys OpenAI V.0.9.1 | Botnet Integration | Loader/Stealer

Submitted by niko1425 at 18-05-2025, 08:52 AM


#1 Rhadamanthys OpenAI V.0.9.1 | Botnet Integration | Loader/Stealer
295 Views
niko1425's Avatar'
niko1425
Offline
#1
Rhadamanthys

A cutting-edge, multi-functional toolkit designed for precision data collection, cryptocurrency analysis, and stealth operations. Built for compatibility across legacy and modern Windows systems (XP–Win11), it prioritizes evasion of detection tools (AV/EDR) and in-memory execution to ensure operational discretion.
Core Features
[Image: dashboard.jpg]

Dashboard

Displays a map where countries are shaded darker based on the number of logs. Nearby, you can see the number of Passwords and Wallets extracted, the total number of unique executions, the executions made today, and the total executions since the last setup. The current Server Disk and Memory usage are also shown

[Image: logs-panel.jpg]

Logs Panel

This panel displays all executions. Each entry includes an ID, which increments with each execution, the country flag along with the IP address, and a status tag indicating whether any information added to the Custom tags was extracted. Nearby, you can see the number of extracted Credit Cards, Passwords, Cookies, and Wallets. The Client's Build Tag identifies which payload was executed, along with the time of execution. Information about the plugins is also provided. the Keyboard icon indicates keylogs were recorded,  the Undercover icon shows that the AI detected relevant information, steam icon shows that steam session was extracted. Additionally, you can leave a custom comment for each log.

[Image: Cracked-wallet.jpg]
Wallet Cracking

If a wallet has been successfully cracked (using automatic brute force or the Wallet Recovery Plugin with AI detection), the wallet password will be displayed here. If the mnemonic phrase was also recovered, it will be shown as well.

[Image: log-panel.jpg]
Log panel

In the Log panel, you can view detailed information about the Log without the need to download it. This includes all passwords, a screenshot taken at the point of execution, the Mnemonic phrase (if recovered), and other wallet-related information. Additionally, you can see the execution status of the plugins. If any plugin fails to execute successfully, the corresponding error code will be displayed.

[Image: plugin-manager.jpg]
Plugin Manager

In this section, you can manage your plugins. You can upload new plugins and modify their configurations. The software comes with several plugins included at no additional cost, such as Clipper, Key Logger, Reversed Proxy, Steam Stealer, and Wallet Stealer.

[Image: plugin-task-manager.jpg]
/url]

Plugin Task Manager

Here, you can view information about the execution of your plugins. You also have the option to develop your own plugins using our plugin engine, available in C#.


[Image: plugin-data.jpg]

Plugin Data

In this section, you can view detailed data for each plugin. You will be able to download keylogs, access cracked wallets, view clipper logs (including which wallet address was replaced, when, and where), and download Steam session files

[Image: file-grab.jpg]

File Grab

This is a configurable grabber designed to extract files. You can customize the file extensions to target, specify which directories to include or exclude, define the maximum file size, and set the search depth.

[Image: custom-tags.jpg]

Custom Tags

You can create custom tags and configure the stealer to search for specific keywords associated with those tags. When a keyword is found, the tag will appear when hovering over the Tag icon in the Log panel. Additionally, you can filter the logs to display only entries with selected tag(s).

[Image: telegram-log.jpg]

Telegram Bot

You can configure a Telegram bot to send you private messages or post messages in a Telegram group/channel whenever a new log is received, a wallet is cracked, custom tags are found, and more. The message content can be customized, and the log can be included as a download link, directly accessible from the panel.

[Image: builder.jpg]

Builder

The Builder allows you to create the payload. You can define the URL, specifying a shim server URL if you're using one. You can also choose which information to steal; by default, all options are enabled, and this does not affect the build size.

You have the option to choose from 6 different payload types:

x64 DLL
x86 DLL
.NET 4 C# EXE
Native x64 EXE
Native x86 EXE
Shellcode x64+x86
Shellcode x86
Shellcode x64

[Image: shim-server.jpg]

Shim Server

A Shim server allows you to protect your main panel IP from external access by obfuscating the panel's IP. All traffic will be routed through the shim server. If you plan to use the Reversed Proxy, a separate Elysium Panel will run on the Shim server.

[Image: proxy.jpg]

1) Modify the proxy server configuration to set the port to 443 or 80.
2) When setting up the proxy server connection, directly enter the domain name

1. Stealth Architecture

    Zero Disk Writes: Fully memory-resident client (C/C++ native, no DLL/CRT dependencies).

    AMSI/ETW Bypass: Execute scripts undetected via syscall unhooking and reflective loading.

    Persistence: Auto-start via registry, scheduled tasks, or service installation.

2. Cross-Platform Compatibility

    Supports Windows XP SP3 through Windows 11.

3. Secure Communication

    AES256 + ECC encryption for client-server data streaming.

Comprehensive Data Collection
System Profiling


    Hardware/Software: CPU/RAM specs, screen resolution, installed software, AV/EDR screenshots.

    User Data: Usernames, GEOIP, timezone, environment variables.

Browser Extraction

    Supported Browsers:

        Chromium: Chrome, Edge, Brave, Yandex (portable versions included).

        Gecko: Firefox, Waterfox.

        Legacy: IE-based (Trident kernel).

    Data Harvested:

        Cookies, history, passwords, credit cards.

        800+ Extensions: MetaMask, Phantom, Keplr, Binance Chain, etc.

Cryptocurrency Wallets

    Browser Extensions:

    Auvitas, BitApp, Crocobit, Exodus, Finnie, GuildWallet, ICONex, Jaxx, Keplr, Liquality, MTV Wallet, Math,  
    Metamask, Mobox, Nifty, Oxygen, Phantom, Rabet, Ronin, Slope, Sollet, Starcoin, Swash, Terra Station, Tron,  
    XinPay, Yoroi, ZilPay, Binance, Coin98  

    Desktop Wallets:
   

    Armory, AtomicWallet, AtomicDEX, Binance, Bisq, BitcoinCore, BitcoinGold, Bytecoin, Coinomi, DashCore,  
    DeFi-Wallet, Defichain-electrum, Dogecoin, Electron Cash, Electrum, Electrum-LTC, Ethereum, Exodus, Frame,  
    Guarda, Jaxx, LitecoinCore, Monero, MyCrypto, MyMonero, Safepay, Solar, TokenPocket, WalletWasabi, Zap,  
    Zcash, Zecwallet Lite  

FTP & Email Clients

    FTP:

    Cyberduck, FTP Navigator, FTPRush, FlashFXP, SmartFTP, TotalCommander, WinSCP, WS_FTP, CoreFTP  

    Email:

    Outlook, Thunderbird, eM Client, Foxmail, TheBat!, Mailbird, CheckMail, Claws-mail, PostboxApp, TrulyMail, GmailNotifierPro  

Additional Targets

    2FA Tools: KeePass (key extraction), WinAuth, Authy.

    VPNs: OpenVPN, ProtonVPN, Windscribe, AzireVPN, [censored].

    Messengers: Telegram, Discord, Pidgin, Tox.

    Games: Steam credentials.

Advanced Modules

1. File Grabber

    Wildcard/Recursive Search: Compatible with PuTTY syntax.

    System Variables: Target USB drives (%DSK2%), network shares (%DSK5%).

2. PowerShell Integration

    Run scripts in isolated, AMSI-bypassed environments.

    Memory-load .NET assemblies or shellcode.

3. Clipper Module (VIP)

    Hijack crypto transactions (BTC, ETH, XMR, TON ). many more (will provide the full list soon)

4. Proxy Management

    Elysium Panel: Rotate SOCKS5/HTTP proxies, one-click export.

5. AI-Powered Tools

    Extract seed phrases from images/PDFs (v0.7+).

6. Keylogger

Version Highlights
v0.9.1 (OUT NOW)
v0.9 (Latest)

    800+ Browser Extensions | Yandex Support | TON Cryptocurrency

    HTTP/HTTPS Task Execution | Persistence Framework | Real-Time Exodus Fixes

v0.7

    AI OCR | Client/Server Rewrite | Telegram HTML Notifications

v0.5

    Observer Mode | Plugin SDK | Keylogger/Data Spy

Pricing & Licensing

1 Month: $350

3 Months: $700

6 Months: $1,300

12 Months: $3,000

Lifetime: $4,000


    Unlimited Crypts for Rhadamanthys. $70/Monthly (WD Guaranteed.) Normal Grade Encryption. 
    
    If you need crypt for a specific AV/EDR, just tell me we will find a solution.

    Payment: BTC/XMR accepted.
    Escrow Accepted.

Terms:

Rhadamanthys is developed and distributed strictly for legal cybersecurity purposes, including:

    Authorized penetration testing.

    Vulnerability research.

    Forensic analysis.

    Red team exercises.

By acquiring this tool, you agree to:

    Comply with all applicable local, national, and international laws.

    Use the software only on systems you own or have explicit permission to test.

    Assume full legal and financial responsibility for any misuse.
  
Legal Disclaimer
This software ("Rhadamanthys") is provided for AUTHORIZED SECURITY TESTING PURPOSES ONLY. By downloading, installing, or using this software, you acknowledge and agree to the following:

This tool is intended exclusively for security professionals conducting authorized penetration testing, security audits, or educational purposes.
You MUST obtain explicit written permission from the owner of any system, network, or data before using this tool.
The creator(s) of this software accept NO RESPONSIBILITY for any misuse, damage, or illegal activity resulting from the use of this software.
Unauthorized use of this software against systems without proper authorization may violate local, state, federal, or international laws.
Users are solely responsible for ensuring their use of this software complies with all applicable laws and regulations.
This software is provided "as is" without warranty of any kind, either expressed or implied.
                         🔥 DAILY FREE LOGS PAYPAL/CRYPTO/AMAZON/GMAIL 🔥


                                                                                                [Image: Chat-GPT-Image-10-Mai-2025-21-08-38.png]
0
Reply
Remio's Avatar'
Remio
Offline
#2
Known fake. PM for proofs / details.
0
Reply
niko1425's Avatar'
niko1425
Offline
#3
23-05-2025, 01:10 PM Remio Wrote:
Known fake. PM for proofs / details.
the only known fake here is your brain you faggot
                         🔥 DAILY FREE LOGS PAYPAL/CRYPTO/AMAZON/GMAIL 🔥


                                                                                                [Image: Chat-GPT-Image-10-Mai-2025-21-08-38.png]
0
Reply
Remio's Avatar'
Remio
Offline
#4
Let's wait for someone else to give their opinion and also say it's shit
0
Reply



Users browsing this thread: