Skip to content

Remote Administration Either you are a private user wanting to control your PC from afar, or a big company which wants to administrate hundreds of machines from a single computer,

License

Notifications You must be signed in to change notification settings

MystersCat/ICARUS-HVNC

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ICARUS HVNC

Icarus Enshrouded Workstation offers a simple, user-friendly interface. All operations are done within the hidden workstation. Features include keylogging, clipboard surveillance, geolocation tracking, web browser activities, application manipulation, system configurations, and starting mstsc.exe (Remote Desktop Protocol). This exceptional HVNC (Hidden Virtual Network Computing) is unique due to its many features. It supports hidden platforms like Discord, Telegram, Skype, DingTalk, and more.

How to Compiling

  • Download the project to your computer as zip
  • Extract Project to Folder.
  • Make Sure You Have Visual Studio Installed on Your Computer
  • Click if Visual Studio is Not Installed
  • Open the solution file (.sln).
  • Select Build Solution from the Build menu or press Ctrl+Shift+B to compile the project.
  • When the build is complete, select Start Without Debugging from the Debug menu or press Ctrl+F5 to run the project.

Questions & Answers

What is Concealed VNC? Concealed VNC is used by advanced users to control a computer without interacting with the main desktop. It creates a hidden desktop environment.
Can intermediate users use this software? Yes, the software is designed for intermediate users. With a simple click, you can control your computer.
What can I do with it? With Veiled VNC, you can silently interface with your remote computer without any intrusive pop-ups.
Is this application compatible with all versions of Windows? Yes, it works with all versions of Windows, both 32-bit and 64-bit, except Windows XP and Vista.

Which Browsers does it work on?

icons8-chrome-48 icons8-brave-web-browser-48 icons8-microsoft-edge-48 icons8-firefox-48 icons8-vivaldi-web-browser-48 icons8-opera-48

Functionalities: Enhance Your Capabilities

  • Two-Factor Authentication Handling
  • WebGL Integration
  • Secure Channel Creation
  • Native Crypter Integration
  • Networking Framework Version 2 Support
  • Networking Framework Version 4 Support
  • Process Monitoring
  • Anti-Debugging Features
  • False :pgon Integration
  • Clipboard Extraction
  • Export as .bat File
  • Export as .bin File
  • Initiate and End Operations
  • Rootkit HVNC Management
  • Telegram Surveillance
  • Discord Surveillance
  • Advanced Password Recovery
  • File Retrieval
  • Anti-VM Detection
  • Export as Macro Script
  • Keystroke Logging
  • Whitelist Directory Exclusion
  • Customer Support
  • Profile Duplication
  • Bidirectional Communication
  • Reflective Stub Integration
  • RunPE Capability
  • Secured Communication Channel
  • Efficient TCP Server
  • Data Encryption (XOR/AES)
  • Export as .vbs File
  • Geolocation Accuracy

Project Construction and Export Options

Design and Build: Set Up Your Project

  • Custom Icon
  • Export as .bin File
  • Specify Directory
  • Define File Name
  • Configure Port
  • Set IP/Domain Name
  • Monitoring Setup
  • Startup/Task Configuration
  • Define Identifier
  • Integrate Rootkit

Export Formats: Choose Your Option

  • AMSI Bypass
  • ETW Evasion
  • API Decoupling
  • .NET Framework 2.0 Compatibility
  • .NET Framework 4.0 Compatibility
  • Embedded Shellcode
  • Batch Scripting
  • Executable (EXE) Format
  • Visual Basic for Applications (VBA)
  • Visual Basic Script (VBS)

Overview

ezgif-4-6220490b84

Disclaimer

This source code is for educational purposes only. It's created to explore reverse engineering without impacting other gamers' experiences.

License

This project is licensed under the MIT. For more information, see the License.