ICARUS HVNC
Icarus Enshrouded Workstation offers a simple, user-friendly interface. All operations are done within the hidden workstation. Features include keylogging, clipboard surveillance, geolocation tracking, web browser activities, application manipulation, system configurations, and starting mstsc.exe (Remote Desktop Protocol). This exceptional HVNC (Hidden Virtual Network Computing) is unique due to its many features. It supports hidden platforms like Discord, Telegram, Skype, DingTalk, and more.
How to Compiling
- Download the project to your computer as zip
- Extract Project to Folder.
- Make Sure You Have Visual Studio Installed on Your Computer
- Click if Visual Studio is Not Installed
- Open the solution file (.sln).
- Select Build Solution from the Build menu or press
Ctrl+Shift+B
to compile the project. - When the build is complete, select Start Without Debugging from the Debug menu or press
Ctrl+F5
to run the project.
Questions & Answers
What is Concealed VNC?Can intermediate users use this software?What can I do with it?Is this application compatible with all versions of Windows?
Which Browsers does it work on?






Functionalities: Enhance Your Capabilities
- Two-Factor Authentication Handling
- WebGL Integration
- Secure Channel Creation
- Native Crypter Integration
- Networking Framework Version 2 Support
- Networking Framework Version 4 Support
- Process Monitoring
- Anti-Debugging Features
- False :pgon Integration
- Clipboard Extraction
- Export as .bat File
- Export as .bin File
- Initiate and End Operations
- Rootkit HVNC Management
- Telegram Surveillance
- Discord Surveillance
- Advanced Password Recovery
- File Retrieval
- Anti-VM Detection
- Export as Macro Script
- Keystroke Logging
- Whitelist Directory Exclusion
- Customer Support
- Profile Duplication
- Bidirectional Communication
- Reflective Stub Integration
- RunPE Capability
- Secured Communication Channel
- Efficient TCP Server
- Data Encryption (XOR/AES)
- Export as .vbs File
- Geolocation Accuracy
Project Construction and Export Options
Design and Build: Set Up Your Project
- Custom Icon
- Export as .bin File
- Specify Directory
- Define File Name
- Configure Port
- Set IP/Domain Name
- Monitoring Setup
- Startup/Task Configuration
- Define Identifier
- Integrate Rootkit
Export Formats: Choose Your Option
- AMSI Bypass
- ETW Evasion
- API Decoupling
- .NET Framework 2.0 Compatibility
- .NET Framework 4.0 Compatibility
- Embedded Shellcode
- Batch Scripting
- Executable (EXE) Format
- Visual Basic for Applications (VBA)
- Visual Basic Script (VBS)

Download
Choose a convenient way for you to download and download the file.
If the archive asks for a password, enter – enesoftware
Mirrored | Download |
Mega | Download |
Ya.Disk | Download |
Torrent File | |
Download by magnet-link | |
Loclouds | Download |
Alternative link for bypassing blockades | Download |
To download files via Torrent File or magnet-link you need to download a torrent client. I recommend using utorrent
You can download the installer from our partners.