Malware
RATs (remote access trojans)
RATs provide interactive remote control of an infected device. This page is an overview for awareness and safe response—not instructions to build or use malware.
Capabilities
Remote screen, file browsing, and command execution on the victim device.
Credential access via browser data, saved sessions, and local secrets.
Optional persistence so access returns after reboot or logoff.
Usage
If you suspect compromise: disconnect, back up essentials, and scan from a trusted tool.
Reset passwords from a clean device and enable strong 2FA where possible.
Reinstall the OS if you cannot verify the system is clean.