Let’s be honest: Remote Access Trojans (RATs) are one of the most insidious threats on Windows machines. They hide in plain sight, persist across reboots, and often leave no obvious trace. So I built a tool to expose them.
🔐 Introducing RAT Hunter – Pro Edition
A portable Python script designed to scan your Windows system for signs of RAT activity, persistence mechanisms, and suspicious behaviors — all without installing anything.
⚙️ What it does
• 🧠 Analyzes autoruns, services, scheduled tasks, WMI events
• 🕵️♀️ Flags suspicious executables, hidden startup entries, and stealthy persistence
• 📦 Runs from terminal, USB, or recovery environment
• 🧾 Outputs clean, readable results for forensic use
🧰 Why I built it
I wanted a tool that:
• Works offline
• Doesn’t rely on antivirus
• Gives clear, actionable insights
• Can be used by analysts, sysadmins, or curious users
📦 What’s inside
• rat_hunter_pro.py – the main script
• README.txt – bilingual usage guide
• LICENSE.txt – MIT license
• DISCLAIMER.txt – ethical use only
• requirements.txt – no external dependencies
🧪 Use cases
• Forensic triage
• OSINT investigations
• Security audits
• Personal system checks
💸 Available on Ko-fi
👉 https://ko-fi.com/mentalistops
🧠 Bonus
No installation. No GUI. Just pure terminal power.
If you want to know what’s really running on your system — this tool will tell you.
Top comments (0)