Get Mystery Box with random crypto!

Proton Rat The real threat behind the software is this: The | 𝗛𝗔𝗖𝗞𝗜𝗡𝗚 𝗧𝗢𝗢𝗟𝗦™️

Proton Rat

The real threat behind the software is this: The malware is shipped with genuine Apple code-signing signatures. This means the author of Proton RAT somehow got through the rigorous filtration process Apple places on MAC OS developers of third-party software and obtained genuine certifications for his program.

Execute any bash command under root
Monitor keystrokes (we even have tariff allowing to log passwords)
Get notified each time your clients enters something
Upload files to remote machine
Download files from remote machine
Connect directly via SSH/VNC to remote machine
Get screenshots/webcam shots
Satisfy gatekeeper bu choosing signed bundle
Develop your own panel/program, bundle with our extensive API
Get updates on the air
and much more...

Note
It's only for educational purpose, must use it in rdp or virtual machines

By: @CIDHUB