Hey guys..I wud lik to noe some stuff..
1.Since RAT's are Remote administration tools, does that mean that once I gain access to the victim's com, they can't control it? How can I choose to let them control the computer while silently spying on them?
2.Will RAT's significantly slow down victim's com? Also, when there's a destructive feature i.e. flooding feature in the connections feature(Bandook), can I choose to not flood the victim's com but ony to gain access and information?
3. I currently have Bandook, but which do ya'll think is better for monitoring, access but non-destructive purpose? Turkojan 4.0 or Bandook 1.35?