Remus - 24/7 support, a stealer with unique functionality, 90% typing accuracy, even a child can figure it out!

R

RemusStealer

Guest
Remus
This is a MaaS stealer with new, and most importantly, useful functionality you haven't encountered anywhere else. It collects more data than ANY solution on the market. We've undergone extensive testing behind closed doors, and today we can offer you the most stable, convenient, and engaging product on the market. We understand how expensive traffic is these days, so thanks to technical solutions never seen before in this industry, we're ready to provide you with virtually 100% uptime. Not a single data log will be lost!

Panel
Thanks to the new collection and click statistics system, you can pinpoint click rates with high accuracy and adjust specific rules, ultimately obtaining more complete logs. Statistics can be tracked in a convenient format; no need to be an analyst or a PhD in mathematics — even a child can figure it out!
We've prepared a well-designed and thoughtful web panel for you, where everything is carefully planned and in its proper place. We promise that after 20 minutes of use, you'll be able to use this panel with your eyes closed. There are no tangled settings, no piles of unnecessary buttons, no multitude of similar pages, and no unnecessary actions.

Build
This is a stealer whose main task is to remove everything from the victim's computer that isn't nailed down, and everything that is nailed down is at least an attempt. We've designed the build to quickly and quietly collect as much data as possible from the victim without them noticing. This is why we don't have browser locks like our competitors, nor excessive network and CPU loads. If the victim doesn't notice, the data will last longer and have a better chance of being processed effectively. Our product handles all its tasks perfectly; more detailed technical information is provided below. The build uses exclusively system calls to communicate with the victim's system, which prevents hooks and other detection methods from EDR.

Functionality (from the simple to the technical)
  1. Collects 21 browsers
  2. Collects 16 cold wallets
  3. Collects 38 apps (including 2FA, password managers, etc.)
  4. Collects 181 wallets from Chrome extensions, 43 password managers, 5 payment extensions, 11 notes, and 13 two-factor authentication extensions
  5. Collects 42 wallets, 22 password managers, and 4 two-factor authentication extensions from Mozilla (this is an unprecedented number of extensions from Mozilla; no one else on the market has collected such a large number)
  6. Collects card data (CC + CVV)
  7. Collects browser history
  8. Flexible and fast search by request, the ability to select precise logical conditions (AND, OR)
  9. Built-in SORTER: no need to buy third-party ones to select the necessary links
  10. Log content assessment system (complete/incomplete) with detailed statistics
  11. System Filters for cookies, passwords, and browser history
  12. Pre-built filters for various areas, from social networks to the corporate segment
  13. The ability to instantly view logs (directly in the browser, without downloading)
  14. The ability to configure a knockback in Telegram
  15. The ability to create exports to an unlimited number of logs
  16. Collects important files from a variety of system directories, including seed phrases, private keys, and passwords
  17. Flexible configuration of collected browsers, extensions, and files
  18. The ability to see which files or browsers are causing the knockback to drop, allowing you to modify them and increase the knockback
  19. Convenient statistics settings with the ability to create a single page for a single build, a single page for several builds, or different pages for different builds
  20. Flexible configuration of knockback servers and the ability to deploy your own (Docker)
  21. Configuration encryption system to complicate server detection and the installation of detectors
  22. System calls for communicating with the victim's system
  23. EDR Bypass
  24. Proprietary communication protocol Server
  25. Encryption of all sent data to complicate analysis
  26. Additional data compression to ensure fast response
  27. A unique algorithm for detecting honeypots and virtual machines, with the ability to detect dedicated servers (Dedicated Servers)
  28. Extensive configuration system, allowing you to configure data collection for anything out of the box, while the system is intuitive
  29. Support for configuring data collection for Chrome browsers and any available extensions
  30. Support for configuring data collection for Gecko (Mozilla) browsers and any available extensions
  31. Support for configuring registry collection by path and key
  32. Support for configuring file collection by path with support for masks, shortcuts, depth, exclusions, and size limits
  33. No CRT support to complicate analysis
  34. Low build size
  35. Build obfuscation to complicate analysis
  36. The build is implemented in C++, which provides benefits in size, speed, and frequency of cleanups
  37. Server-side queues for storing logs during server updates or other technical issues
  38. Caching system for faster responses servers
  39. A sophisticated and beautiful React interface allows for more frequent updates
  40. Microservice architecture for improved fault tolerance in the industry

Tariffs
Prices may be expanded as updates are made. We strive to always keep our list of features up-to-date. Tariffs may be added, and their prices for new customers may change.

Basic, price: $250
  1. Log search with standard filters
  2. Create log filters
  3. Edit and delete filters
  4. Create a single build
  5. View the collection configuration without editing it
  6. View precise log completeness statistics without the ability to influence them
  7. Create and edit a single statistics page
  8. Create log archives (downloads)
  9. Create a single Telegram bot

Professional, price: $500
  1. Log search with any filters
  2. Unlimited creation of log filters
  3. Edit and delete filters
  4. Create an unlimited number of builds
  5. Edit collections, add custom rules, and view collections
  6. Ability to influence precise click statistics by changing the collection order or rules
  7. Create an unlimited number of statistics pages
  8. Create log archives (downloads)
  9. Create an unlimited number of bots
  10. View detailed information Logs without downloading them
  11. Ability to run multiple downloads simultaneously
  12. More flexible bot configuration in Telegram
  13. More flexible statistics configuration in Telegram

For all questions 24/7: @remusoperator (click) t.me/remusoperator
Contact 24/7: @remusoperator (click) t.me/remusoperator
 
Back
Top