Really fat RAT
Go to file
Edo -maland- 133e9049e2 Merge pull request #53 from peterpt/master
version update 1.8.1
2017-02-27 12:27:12 +07:00
PE Add files via upload 2016-09-14 00:33:03 +07:00
autorun Delete icon.res 2016-08-07 13:54:19 +07:00
backdoored/output Create README.md 2016-09-01 11:23:29 +07:00
config config folder 2017-02-23 14:12:25 -05:00
icons Update README.md 2016-09-01 12:52:45 +07:00
logs Create readme.md 2017-02-23 13:39:07 -05:00
output Update README.md 2016-09-01 12:54:01 +07:00
postexploit Added post exploitation 2016-09-01 11:26:39 +07:00
temp Update README.md 2016-09-01 12:53:44 +07:00
tools Update apkembed.rb 2017-02-26 20:39:01 -05:00
CHANGELOG.md Update CHANGELOG.md 2017-02-26 21:33:55 -05:00
Dockerfile packages update 2017-02-26 21:24:08 -05:00
LICENSE Initial commit 2016-07-24 17:30:19 +07:00
README.md version update 2017-02-26 21:26:36 -05:00
fatrat version update 2017-02-26 21:31:01 -05:00
powerfull.sh update 2017-02-23 14:21:56 -05:00
prog.c Add files via upload 2016-07-29 13:57:16 +07:00
prog.c.backup Backups 2016-09-01 12:42:45 +07:00
setup.sh Update setup.sh 2017-02-26 16:32:40 -05:00

README.md

#TheFatRat ( Unit for bypass av )

##Update: Version 1.8.1 ##Codename: Spark

What is TheFatRat ??

An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

#Screenshot #---------------------------------------------------------------

#Automating metasploit functions

  • Checks for metasploit service and starts if not present

  • Easily craft meterpreter reverse_tcp payloads for Windows, Linux, Android and Mac and another

  • Start multiple meterpreter reverse_tcp listners

  • Fast Search in searchsploit

  • Bypass AV

  • File pumper

  • Create backdoor with another techniq

  • Autorunscript for listeners ( easy to use )

  • Drop into Msfconsole

  • Some other fun stuff :)

#Autorun Backdoor

  • Autorun work if the victim disabled uac ( user acces control ) or low uac ( WINDOWS )
  • What is uac ? you can visit ( http://www.digitalcitizen.life/uac-why-you-should-never-turn-it-off )
  • I have also created 3 AutoRun files
  • Simply copy these files to a CD or USB
  • You can change the icon autorun file or exe in folder icon ( replace your another ico and replace name with autorun.ico )

#HOW CHANGE THE ICONS ?

  • Copy your icon picture to folder /TheFatrat/icons
  • Change the name into autorun.ico
  • And Replace
  • Done

📜 Changelog

Be sure to check out the [Changelog] and Read CHANGELOG.md

Getting Started

  1. git clone https://github.com/Screetsec/TheFatRat.git
  2. cd TheFatRat/setup
  3. chmod +x setup.sh && ./setup.sh

Alternative: Docker

$ git clone https://github.com/Screetsec/TheFatRat.git
$ cd TheFatRat
$ docker build -t=thefatrat .
$ docker run -it --name "thefatrat" thefatrat

And it's up & running.

📖 How it works

  • Extract The lalin-master to your home or another folder
  • chmod +x fatrat
  • chmod +x powerfull.sh
  • And run the tools ( ./fatrat )
  • Easy to Use just input your number

Requirements

  • A linux operating system. We recommend Kali Linux 2 or Kali 2016.1 rolling Cyborg / Parrot / Dracos / BackTrack / Backbox / Devuan and another operating system ( linux )

  • Must install metasploit framework

READ

  • if prog.c file to large when create backdoor with powerfull.sh , you can use prog.c.backup and create another backup when you running option 2

Tutorial ?

BUG ?

  • Submit new issue
  • pm me
  • Hey sup ? do you want ask about all my tools ? you can join me in telegram.me/offscreetsec

:octocat: Credits

Disclaimer

Note: modifications, changes, or alterations to this sourcecode is acceptable, however,any public releases utilizing this code must be approved by writen this tool ( Edo -m- ).