
Greypiller
humanity has to be exterminated
- Joined
- Mar 5, 2024
- Posts
- 11,478
- Reputation
- 24,894
RATTING GUIDE (Simplified for dummies)
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).
Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types
What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about
Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :
Python
PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect
C
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors
C#
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net
C++
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code
Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.
Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.
Any sort of discord / telegram bot
Pros :
easy to setup
cons :
everything else sucks ass
Tunneling
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive
Vps/server
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive
How to punch windows defender/Triage in the balls.
Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research
, here are a few basic terms you need to know.
Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.
Okay greypiller this all sounds really cool man now how many racks am i gonna be making
Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)
WHAT NOT TO DO
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead
. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself
How to spread????


This is the part you gotta be good at or your rat will miserably fail
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :
Which file types have potential for ratting
.exes
(obviously duh)
.dlls
pdfs using vulnerabilities
remember no file type is completely untouchable for ratting potential , you just need to expirement.
Anyway hope you lads enjoyed this concise and quick guide , greypiller out

before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).
Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types
What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about
Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :
Python

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect
C

Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors
C#

PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net
C++

Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code
Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.
Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.
Any sort of discord / telegram bot

Pros :
easy to setup
cons :
everything else sucks ass
Tunneling

Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive
Vps/server

Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive
How to punch windows defender/Triage in the balls.
Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research
Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

Okay greypiller this all sounds really cool man now how many racks am i gonna be making

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)
WHAT NOT TO DO

Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead
How to spread????

This is the part you gotta be good at or your rat will miserably fail
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :
Which file types have potential for ratting
.exes
(obviously duh)

.dlls

pdfs using vulnerabilities

remember no file type is completely untouchable for ratting potential , you just need to expirement.
Anyway hope you lads enjoyed this concise and quick guide , greypiller out