> cat /dev/github | grep security-tools
discovered 30 Mar 2026

paradoxiaRAT

C ★ 822 via github-topic
→ View on GitHub

AI Summary: Paradoxia is a Remote Access Tool (RAT) designed for covert control of target systems, featuring a user-friendly console that allows users to easily build and deploy client applications. Notable capabilities include multithreading for multiple session management, full file access, keylogging, microphone recording, and remote execution commands, alongside stealth operation and persistent installation. This tool is intended for malicious use, as indicated by its detection as malware by security software.


README

Paradoxia Remote Access Tool.

Are you looking for a GUI alternative? Check out Remote Hacker Probe. More Advanced and Stable with ton of features.

Features

Paradoxia Console
FeatureDescription
Easy to useParadoxia is extremely easy to use, So far the easiest rat!
Root Shell-
Automatic Client buildBuild Paradoxia Client easily with or without the icon of your choice.
MultithreadedMultithreaded Console server, You can get multiple sessions.
Toast NotificationsDesktop notification on new session
Configurable SettingsConfigurable values in paradoxia.ini
Kill SessionsKill Sessions without getting in session.
View Session informationView Session information without getting in Session.

Paradoxia Client
FeatureDescription
StealthRuns in background.
Full File AccessFull access to the entire file system.
PersistenceInstalls inside APPDATA and has startup persistence via Registry key.
Upload / Download FilesUpload and download files.
ScreenshotTake screenshot.
Mic RecordingRecord Microphone.
Chrome Password RecoveryDump Chrome Passwords using Reflective DLL (Does not work on latest version) :shipit:
KeyloggerLog Keystrokes and save to file via Reflective DLL.
GeolocateGeolocate Paradoxia Client.
Process InfoGet Process information.
DLL InjectionReflective DLL Injection over Socket, Load your own Reflective DLL, OR use ones available here.
Power offPower off the Client system.
RebootReboot the client system.
MSVC + MINGW SupportVisual studio project is also included.
Reverse ShellStable Reverse Shell.
Small ClientMaximum size is 30kb without icon.

Installation (via APT)

$ git clone https://github.com/quantumcored/paradoxiaRAT
$ cd paradoxiaRAT
$ chmod +x install.sh
$ sudo ./install.sh

Example Usage :

  • Run Paradoxia
sudo python3 paradoxia.py
  • Once in paradoxia Console, The first step would be to build the Client, Preferably with an Icon.

pd1

  • After that’s built, As you can see below it is detected by Windows Defender as a severe malware. Which is expected since it IS malware.

pd2

  • I’m going to transfer the client on a Windows 10 Virtual machine and execute it. After Executing it, It appears under Startup programs in task manager.

pd3

  • Also it has copied itself inside Appdata directory and installed under the name we specified during build.

pdmiss

  • At the same time, I get a session at server side.

pd4

  • First thing I’d do is get in the session and view information.

pd5

  • There are plenty of things we can do right now, but for example only, I will demonstrate keylogging.

pd6

You can see in the image above that It says it successfully injected dll, And in file listing there is a file named log.log, Which contains the logged keystrokes.

  • Lets view captured keystrokes.

pd7

Changelogs

  • This repository was home to 3 tools previously, Iris, Thawne and Previous version of Paradoxia. This can be found here.
  • Everything is entirely changed, Client has been rewritten, Infodb removed. Much new features added. Stability added.

Developer

Hi my name’s Fahad. You may contact me, on Discord or My Website

LICENSE

VIEW LICENSE

The Developer is not responsible for any misuse of Damage caused by the program. This is created only to innovate InfoSec and YOU. :point_left:

Help me with my future projects. Thank you. Donate with Crypto