[GH-ISSUE #535] Suggestions #297

Open
opened 2026-02-27 15:49:45 +03:00 by kerem · 0 comments
Owner

Originally created by @kkar on GitHub (Sep 29, 2016).
Original GitHub issue: https://github.com/quasar/Quasar/issues/535

Hey @MaxXor ,
I am using your RAT for my Penetration Tests. Thank you so much for this lovely tool.

I have some suggestions for you, or.. ideas if you want.

First idea, is to add a function to locate the physical address of the clients. I wrote a vbs example a long time ago. It works by scraping cmd results but it supports only english language operating systems. This can be bypassed by using "managed wifi API" tho. You can see my old example here.

Second idea, is to add a TeamViewer credentials dump function. I also wrote an example for this task, you can see it here.

In addition, i have a very nice method for dynamic imports and since it's .Net, it can be very effective against AVs. I have some "backgroudn" on obfuscation as you can see in my github page, but the .Net dynamic import method i am talking about isn't published there. I could send you the appropriate infos if you want me to.

Once again, thank you for this tool. I am using it to complete my penetration testing scenarios, and i am loving it. Cheers.

Originally created by @kkar on GitHub (Sep 29, 2016). Original GitHub issue: https://github.com/quasar/Quasar/issues/535 Hey @MaxXor , I am using your RAT for my Penetration Tests. Thank you so much for this lovely tool. I have some suggestions for you, or.. ideas if you want. First idea, is to add a function to locate the physical address of the clients. I wrote a vbs example a long time ago. It works by scraping cmd results but it supports only english language operating systems. This can be bypassed by using "managed wifi API" tho. You can see my old example [here](https://github.com/kkar/VBS-Geolocation). Second idea, is to add a TeamViewer credentials dump function. I also wrote an example for this task, you can see it [here](https://github.com/kkar/TeamViewer-dumper-in-CPP). In addition, i have a very nice method for dynamic imports and since it's .Net, it can be very effective against AVs. I have some "backgroudn" on obfuscation as you can see in my github page, but the .Net dynamic import method i am talking about isn't published there. I could send you the appropriate infos if you want me to. Once again, thank you for this tool. I am using it to complete my penetration testing scenarios, and i am loving it. Cheers.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference
starred/Quasar#297
No description provided.