mirror of
https://github.com/Screetsec/TheFatRat.git
synced 2023-12-14 02:02:58 +01:00
100 lines
5.6 KiB
Markdown
100 lines
5.6 KiB
Markdown
|
|
# TheFatRat
|
|
|
|
[![Version](https://img.shields.io/badge/TheFatRat-1.9.7-brightgreen.svg?maxAge=259200)]()
|
|
[![Version](https://img.shields.io/badge/Codename-Whistle-red.svg?maxAge=259200)]()
|
|
[![Stage](https://img.shields.io/badge/Release-Stable-brightgreen.svg)]()
|
|
[![Build](https://img.shields.io/badge/Supported_OS-Linux-orange.svg)]()
|
|
[![Available](https://img.shields.io/badge/Available-BlackArch-red.svg?maxAge=259200)]()
|
|
[![Documentation](https://img.shields.io/badge/CEHv10-eccouncil-blue.svg?maxAge=259200)](https://github.com/ManhNho/CEHv10/tree/master/Slides)
|
|
[![Contributions Welcome](https://img.shields.io/badge/contributions-welcome-blue.svg?style=flat)]()
|
|
|
|
|
|
### A Massive Exploiting Tool
|
|
|
|
![Banner](https://user-images.githubusercontent.com/17976841/65820028-6ae17e00-e24e-11e9-894f-35836481cc2c.png)
|
|
|
|
**TheFatRat** is an exploiting tool which compiles a malware with famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. **TheFatRat** Provides An Easy way to create Backdoors and Payload which can bypass most anti-virus.
|
|
|
|
## Information
|
|
This tool is for educational purpose only, usage of TheFatRat for attacking targets without prior mutual consent is illegal.
|
|
Developers assume no liability and are not responsible for any misuse or damage cause by this program.
|
|
|
|
## Features !
|
|
- Fully Automating MSFvenom & Metasploit.
|
|
- Local or remote listener Generation.
|
|
- Easily Make Backdoor by category Operating System.
|
|
- Generate payloads in Various formats.
|
|
- Bypass anti-virus backdoors.
|
|
- File pumper that you can use for increasing the size of your files.
|
|
- The ability to detect external IP & Interface address .
|
|
- Automatically creates AutoRun files for USB / CDROM exploitation
|
|
|
|
|
|
## Installation
|
|
Instructions on how to install *TheFatRat*
|
|
```bash
|
|
git clone https://github.com/Screetsec/TheFatRat.git
|
|
cd TheFatRat
|
|
chmod +x setup.sh && ./setup.sh
|
|
```
|
|
### Update
|
|
```bash
|
|
cd TheFatRat
|
|
./update && chmod +x setup.sh && ./setup.sh
|
|
```
|
|
|
|
## Tools Overview
|
|
| Front View | Sample Feature |
|
|
| ------------ | ------------ |
|
|
|![Index](https://cloud.githubusercontent.com/assets/17976841/25420100/9ee12cf6-2a80-11e7-8dfa-c2e3cfe71366.png)|![f](https://user-images.githubusercontent.com/17976841/65820886-91a4b200-e258-11e9-9a00-1e5905f6be16.jpg)
|
|
|
|
## Documentation
|
|
- Documentation Available in Modules CEH v9 and V10 , Download source here
|
|
- [CEHv10 Module 06 System Hacking.pdf](https://github.com/khanhnnvn/CEHv10/blob/master/Labs/CEHv10%20Module%2006%20System%20Hacking.pdf)
|
|
- [CEHv10 Module 17 Hacking Mobile Platforms.pdf](https://github.com/khanhnnvn/CEHv10/blob/master/Labs/CEHv10%20Module%2017%20Hacking%20Mobile%20Platforms.pdf)
|
|
- Published in International Journal of Cyber-Security and Digital Forensics
|
|
- [Malware Analysis Of Backdoor Creator : TheFatRat](https://www.researchgate.net/publication/323574673_MALWARE_ANALYSIS_OF_BACKDOOR_CREATOR_FATRAT)
|
|
- Youtube Videos
|
|
- [How To Download & Install TheFatRat](https://www.youtube.com/watch?v=FsSgJFxyzFQ)
|
|
- [TheFatRat 1.9.6 - Trodebi ( Embed Trojan into Debian Package )](https://www.youtube.com/watch?v=NCsrcqhUBCc&feature=youtu.be&list=PLbyfDadg3caj6nc3KBk375lKWDOjiCmb8)
|
|
- [hacking windows 10 with TheFatRat](https://www.youtube.com/watch?v=bFXVAXRXE9Q )
|
|
- [Hacking Windows using TheFatRat + Apache2 Server + Ettercap + Metasploit](https://www.youtube.com/watch?v=FlXMslSjnGw)
|
|
- [Hacking with a Microsoft Office Word Document from TheFatRat](https://www.youtube.com/watch?v=lglOXojT84M)
|
|
- [XSS to powershell attack and bypass Antivirus using BeEF + TheFatRat + Metasploit](https://www.youtube.com/watch?v=pbvg7pgxVjo)
|
|
- [TheFatRat - Hacking Over WAN - Embedding Payload in Original Android APK - Without Port Forwarding](https://www.youtube.com/watch?v=XLNigYZ5-fM)
|
|
- [How To Automatically Embed Payloads In APK's - Evil-Droid, Thefatrat & Apkinjector](https://www.youtube.com/watch?v=C_Og6LnEZSg)
|
|
- [Bind FUD Payload with JPG and Hack over WAN with TheFatRat](https://www.youtube.com/watch?v=VPl1TMCAIy8)
|
|
|
|
|
|
## Changelog
|
|
All notable changes to this project will be documented in this [file](https://github.com/Screetsec/thefatrat/blob/master/CHANGELOG.md).
|
|
|
|
### About issues
|
|
- Read the [document](https://github.com/Screetsec/TheFatRat/blob/master/issues.md) before making an issue
|
|
|
|
## Alternative Best Tool - Generating Backdoor & Bypass
|
|
- [Veil-Framework /Veil](https://github.com/Veil-Framework/Veil) - Veil Framework
|
|
- [Shellter](https://www.shellterproject.com/download/) - Shellter AV Evasion Artware
|
|
- [Unicorn](https://github.com/trustedsec/unicorn) - Trustedsec
|
|
- [MSFvenom Payload Creator (MSFPC)](https://github.com/g0tmi1k/msfpc) - g0tmi1k
|
|
- [Venom](https://github.com/r00t-3xp10it/venom) - Pedro Ubuntu
|
|
- [Phantom-Evasion](https://github.com/oddcod3/Phantom-Evasion) - Diego Cornacchini
|
|
|
|
|
|
## Credits & Thanks
|
|
- [Offensive Security](https://www.offensive-security.com/) - Offensive Security
|
|
- [dracOs Linux](https://dracos-linux.org/) - Penetration Testing OS From Indonesia
|
|
- [peterpt](https://github.com/peterpt) - Maintainer & Contributor
|
|
- [Dana James Traversie](https://github.com/dana-at-cp/backdoor-apk) - backdoor_apk
|
|
- [z0noxz](https://github.com/z0noxz/powerstager) - Powerstager
|
|
- [TrustedSec](https://github.com/trustedsec/unicorn) - Unicorn
|
|
- [Raphael Mudge](https://github.com/rsmudge) - External Source
|
|
- [astr0baby](https://astr0baby.wordpress.com) - Reference Source
|
|
- [NgeSEC](https://ngesec.id/) Community
|
|
- [Gauli(dot)Net](https://gauli.net/) - Lab Penetration
|
|
|
|
## License
|
|
TheFatRat is made with 🖤 by Edo Maland & All [Contributors](https://github.com/Screetsec/TheFatRat/graphs/contributors). See the **License** file for more details.
|
|
|
|
|