Usage of WH-Cyberspace Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.
[+] Features :
1: File Manager :
Delete , Download , Launch Files ,Go through
Folders and Disks , Go Back ,Move File to Bin
2: Encryption :
Can encrypt | decrypt files in files manager with custom
key(AES , RC6 , BlowFish , Salsa20 , Cast6 , TwoFish )
3: Passwords Recovery :
Currenly Supports most Chromium. Web Browsers
4: Tasks Manager :
Kill Tasks , Refresh , Get Information
5: Remote Desktop Viewer (OPTIONAL) :
If you do not want to forward second port ,
do not use
6: Change Wallpaper
7: TaskBar :
Hide , Show ,Hide Apps , SHow Apps
8: Mouse :
Swap Mouse Button , Lock Left Click ,Lock Right Click
Lock Movements ,Lock All , Unlock All
9: Keyboard :
Lock , Unlock
10: Message
11: Computer Power :
Log Out , Reboot , Shutdown , Hibernate,
Suspend
12: BSOD
13: DDOS :
UDP
14: OS INFORMATION :
Get Precious Information about OS
15: Client :
Close , Close And Delete
16: Client Size :
20KB at least (depending on the options you add)
=> easy to encrypt and bind
17: Builder :
X86 ,X64 (Default is AnyCPU) , Stealth Mode ,
Spread , Add To Startup
18: Empty Bin | Trash
19: Show and Hide Desktop Icons
20: Show and Hide Start Icons
21: Spread Client
22: Add Client To Startup
23: RED VIRUS :
Block Keyboard , Block Mouse , add a watchdog
to kill task manager and set a full red screen
window To Close , you need to reboot
24: Fork Bomb
25: vProcess INFO:
Handle , FilePath , ID , BaseAddress , Priority ,
Handle Window , Window title
26: Delete :
Delete Files On Desktop , Delete Files
On Desktop + Reboot
28: Auto Recovery Options
29: Injection Exe (NOT NATIVE)
30:Auto Execute File In memory :
BE SURE IT IS A .NET EXE ,not native
31:Monitor Rotation :
0 , 90 ,180 , 270
[+] More Update in android Section :
-> [Update] Better & Faster Keylogger
-> [Update] Screen Monitor Faster
-> [Update] Optimize apk
-> [Update] Add/Remove Permission in injection
[+] More Update in Application Section :
->Security update
->Gui Update and improve
->Optimize Wh Rat
->Auto Application update in new version
[+] Uninstall app > ( New )
[+] self Uninstall > ( New )
[+] Send Sms > ( New )
[+] Device administrator mode > ( New )
[+] Disable any App in Applications tab > ( New )
[+] Enable App in Applications tab > ( New )
[+] Factory Data reset > ( New )
[+] Files Manager ____________________________[+] Live Key log
[+] Contacts Manager ________________________[+] Download Apk
[+] Calls History _____________________________ [+] Send Pop-Pop Sms
[+] Call / USSD _______________________________ [+] System Clipboard
[+] Sms View _________________________________ [+] Open Link
[+] Camera Manager ___________________________ [+] Notifications
[+] MicroPhone Control _______________________ [+] Phone info
[+] Accounts View ____________________________ [+] Command Prompt
[+] Applications _____________________________ [+] phishing attack
[+] Live Screen Control ______________________ [+] victim Rename
[+] Live Location ____________________________ [+] Edit Victim Soket
[+] victim reboot connection _________________ [+] Quit Connection
☆ Net framework 4.8 Here 4.8
☆ Buy LICENSE Key IN Website Here (https://whcyberspace.com)
or
🛒 Buy LICENSE Key direct In Telegram Here (http://t.me/whcyberspace)
[+] Download Zip (https://whcyberspace.com)
[+] Unzip File
[+] Make Sure No [ ] space in Path Location
[+] Click [Wh Rat.exe]
And Run
-
Windows 10/11 [ Recommended System ]
-
Windows 8.1
-
Windows 8
-
Windows 7
Current Framework version : 2.6.0.3
Release date : 10-10-2022
latest Version Release date : 24-july-2023
POWER BY >> WH-Cyberspace
Developer: R47
coeded by : WH-Cyberspace
MIT License
Copyright (c) 2020 - wh-Cyberspace
Permission is hereby granted, Paid of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
AGAIN ...
Usage of WH-Cyberspace Hacking Tool for attacking targets without prior mutual consent is illegal. It's the end user's responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program. Only use for educational purposes.