Speed Troller is a Troll Virus application that allows you to run various troll commands on a Windows system. The application connects to a server via WebSockets. The application also displays a popup window with options to keep, disable, or uninstall Speed Troller.
- Display a popup window with options to keep, disable, or uninstall Speed Troller.
- Execute various commands such as
jumpscare
,mathLock
,soundscare
,setvolume
, and more. - Connect to a server using WebSockets and send/receive messages.
- Automatically reconnect to the server if the connection is lost.
- Send periodic ping frames to keep the WebSocket connection alive.
- JDK 17 or higher
- Gradle
- Windows operating system
-
Clone the repository:
git clone https://github.com/WauHundeland/SpeedTroller.git cd SpeedTroller
-
Build the project using Gradle:
./gradlew build
-
Run the application:
./gradlew run
-
The application will display a popup window with options to keep, disable, or uninstall Speed Troller.
-
The application will also connect to a server via WebSockets and allow you to execute various commands.
The application supports the following commands:
echo
: Echoes the input text.ls
: Lists files in the current directory.cd
: Changes the current directory.sysinfo
: Displays system information.popup
: Displays the Speed Troller popup window.setvolume
: Sets the system volume.desktop
: Executes desktop-related commands.jumpscare
: Displays a jumpscare.mkdir
: Creates a new directory.rmdir
: Removes a directory.delete
: Deletes a file.rename
: Renames a file.open
: Opens a file.shutdown
: Shuts down the system.restart
: Restarts the system.command
: Executes a custom command.customjumpscare
: Displays a custom jumpscare.soundscare
: Displays a jumpscare with sound.mathLock
: Locks the system with a math problem.
To uninstall Speed Troller, click the "Uninstall" button in the popup window. This will run the uninstall.ps1
script located in the src/main/resources
directory.
This project is licensed under the MIT License. See the LICENSE file for details.