Icarus Enshrouded Workstation offers a simple, user-friendly interface. All operations are done within the hidden workstation. Features include keylogging, clipboard surveillance, geolocation tracking, web browser activities, application manipulation, system configurations, and starting mstsc.exe (Remote Desktop Protocol). This exceptional HVNC (Hidden Virtual Network Computing) is unique due to its many features. It supports hidden platforms like Discord, Telegram, Skype, DingTalk, and more.
- Download the project to your computer as zip
- Extract Project to Folder.
- Make Sure You Have Visual Studio Installed on Your Computer
- Click if Visual Studio is Not Installed
- Open the solution file (.sln).
- Select Build Solution from the Build menu or press
Ctrl+Shift+B
to compile the project. - When the build is complete, select Start Without Debugging from the Debug menu or press
Ctrl+F5
to run the project.
What is Concealed VNC?
Concealed VNC is used by advanced users to control a computer without interacting with the main desktop. It creates a hidden desktop environment.Can intermediate users use this software?
Yes, the software is designed for intermediate users. With a simple click, you can control your computer.What can I do with it?
With Veiled VNC, you can silently interface with your remote computer without any intrusive pop-ups.Is this application compatible with all versions of Windows?
Yes, it works with all versions of Windows, both 32-bit and 64-bit, except Windows XP and Vista.- Two-Factor Authentication Handling
- WebGL Integration
- Secure Channel Creation
- Native Crypter Integration
- Networking Framework Version 2 Support
- Networking Framework Version 4 Support
- Process Monitoring
- Anti-Debugging Features
- False :pgon Integration
- Clipboard Extraction
- Export as .bat File
- Export as .bin File
- Initiate and End Operations
- Rootkit HVNC Management
- Telegram Surveillance
- Discord Surveillance
- Advanced Password Recovery
- File Retrieval
- Anti-VM Detection
- Export as Macro Script
- Keystroke Logging
- Whitelist Directory Exclusion
- Customer Support
- Profile Duplication
- Bidirectional Communication
- Reflective Stub Integration
- RunPE Capability
- Secured Communication Channel
- Efficient TCP Server
- Data Encryption (XOR/AES)
- Export as .vbs File
- Geolocation Accuracy
Design and Build: Set Up Your Project
- Custom Icon
- Export as .bin File
- Specify Directory
- Define File Name
- Configure Port
- Set IP/Domain Name
- Monitoring Setup
- Startup/Task Configuration
- Define Identifier
- Integrate Rootkit
Export Formats: Choose Your Option
- AMSI Bypass
- ETW Evasion
- API Decoupling
- .NET Framework 2.0 Compatibility
- .NET Framework 4.0 Compatibility
- Embedded Shellcode
- Batch Scripting
- Executable (EXE) Format
- Visual Basic for Applications (VBA)
- Visual Basic Script (VBS)
This source code is for educational purposes only. It's created to explore reverse engineering without impacting other gamers' experiences.
This project is licensed under the MIT. For more information, see the License.