KIZAGAN is a python computer backdoor(RAT) and it can take camera pictures,screenshot,browser datas and cookies etc...

st4inl3s5 st4inl3s5 Last update: Oct 30, 2023

KIZAGAN

KIZAGAN is a RAT built with python.It can take camera snapshots, screenshots, browser datas and cookies etc. Also it has a keylogger and it is undetectable.

Features

  • Basic file/directory commands.(rename, delete, create etc.)

  • Can execute windows command prompt commands directly.

  • Can get camera snapshots.

  • Can get screenshots.

  • Can download files.

  • Can upload files.

  • Has keylogger.

  • Have persistence.(Persistence:It can hide itself to registry.)

  • Can take wifi names and passwords.

  • Can combine with a file you specify.

  • Constant connections.

  • Undetectable.

  • Can get browser saved usernames and passwords.

  • Can get browser cookies.

EDUCATIONAL PURPOSES ONLY.

I am not responsible in bad uses of kizagan.

SETUP

Firstly, you must need a windows computer.Because we don't want to encounter any errors while converting Python to exe.For server you can use linux or windows it doesn't matter.But we must need windows to conversion process.So execute the following command :

  • python setup.py

USAGE

  1. If you want to put icon to your trojan, go to internet and find a icon.Then download to kizagan-main directory.(or you can convert png, jpg file to .ico file)

  2. If you want to combine a file with trojan, go to internet and find a file you wanted.Then download to kizagan-main directory.

kizagan1

  1. Execute the builder.py to convert python file to windows executable file.

kizagan2

  • -ip = Set the ip address for reverse connection.

  • -p = Set the port number for reverse connection.

  • -i = Set the icon for trojan if you wanted.

  • -f = Set the combine file for trojan if you wanted.

  1. Wait for conversion process.

kizagan3

  1. When its done, you can see the executable file in the 'dist' folder.And from now it's up to you.So send this file to victim(via mail etc.) and wait for opens the file.

  2. Let's say victim opened the trojan.When trojan opened, our combine file will open up.And our trojan is executed background.

kizagan4

  1. You can listen the incoming connections with following command :
  • python server.py -ip <ip_address_to_listen> -p <port_number_to_listen>

kizagan5

  1. When the connection comes, you can start executing commands on target computer.

kizagan6

  1. And we are rocking now! You can see the commands with 'help' command.

kizagan7

kizagan8

  1. And don't forget to remove theese parts in client.py:

kizagan9

You can contact me here or on instagram

Subscribe to our newsletter