Greypillers Ultimative RATTING guide (How to make a simple passive income using malware)

Greypiller

Greypiller

humanity has to be exterminated
Joined
Mar 5, 2024
Posts
11,478
Reputation
24,894
RATTING GUIDE (Simplified for dummies)
Dadada

before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

Dsfdsfsf

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
C Logo

Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
Fdsfsdfsds

PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
Fdsfsfs

Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
Gdffdgdfg

Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
Fsdsfs

Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
Fdsfssd

Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

Imagesfdsfsfsdf


Okay greypiller this all sounds really cool man now how many racks am i gonna be making
5etet


Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
Sadadasdas

Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

Dsaasdasdas

This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :






Which file types have potential for ratting

.exes
(obviously duh)

Sdsfsdfs

.dlls
Fsdfsfs

pdfs using vulnerabilities
Fsdfsfsfs

remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:
 
  • +1
  • JFL
  • Woah
Reactions: CorinthianLOX, Laczekkk, hybobu and 13 others
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

Just beat homeless people and steal their
cup money retard
 
  • +1
  • JFL
Reactions: Laczekkk, Shkreliii, ShowerCelling and 2 others
@Volksstaffel @lestoa @cromagnon @Volksstaffel @Gengar
 
  • +1
Reactions: Shkreliii and Americacel
@Coeus @superpsycho @ey88 @chadhamed @chadbeingmade
 
  • +1
Reactions: Americacel
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

how do i know the link i just clicked on in dxd isn't a rat 😢
 
  • +1
  • JFL
Reactions: Myxzi3, Americacel and Greypiller
@Jatt @Vermilioncore @kurd @SecularIslamist
 
  • +1
Reactions: Americacel
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

stealing prostitutes money after sex>>>
 
  • JFL
  • +1
Reactions: tit, Sadist and Greypiller
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

at last:soy:
 
  • +1
Reactions: Americacel and Greypiller
the song is so shit bruv :feelsree:
 
  • JFL
  • +1
Reactions: penaldinho and Greypiller
the song is so shit bruv :feelsree:
my bad nigger was too lazy to list every single aspect otherwise this thread would have been 2 pages long
 
  • JFL
  • +1
Reactions: ShowerCelling and menas
@Jatt @Vermilioncore @kurd @SecularIslamist
Good thread,

it’s just you won’t make alot of money doing this unless you go for companies and hold them for ransom or data extort, which you would need EFI Certificates for to bypass smartscreen and some kind of pdf exploit to send it through email to employee’s and escalating through their slack chat by sending more to gain access to admin accounts and export data or upload a locker to their systems; thats what makes the big money $$ but will land you in jail 100% if you don’t live in russia.

With regular people its really just maybe like 200 bucks every 7 months, you’d need to find a good group to target.
 
  • +1
Reactions: Americacel and Greypiller
@Quncho nightmare guide those who know
 
  • JFL
Reactions: ShowerCelling and menas
Which AI did you use for making a song btw
 
  • +1
Reactions: Greypiller
Good thread,

it’s just you won’t make alot of money doing this unless you go for companies and hold them for ransom or data extort, which you would need EFI Certificates for to bypass smartscreen and some kind of pdf exploit to send it through email to employee’s and escalating through their slack chat by sending more to gain access to admin accounts and export data or upload a locker to their systems; thats what makes the big money $$ but will land you in jail 100% if you don’t live in russia.

With regular people its really just maybe like 200 bucks every 7 months, you’d need to find a good group to target.
good point op , however if you manage to spread it far enough and get around 100 machines you can make some solid money off xmr mining. oh and i forgot to mention you can sell the logs aswell:smonk:
 
  • +1
Reactions: kurd
good point op , however if you manage to spread it far enough and get around 100 machines you can make some solid money off xmr mining. oh and i forgot to mention you can sell the logs aswell:smonk:
Yeah u could sell the logs however they’re probably not high quality and a couple bucks,

What you could do is export every netflix and spotify account from the pc’s and sell them on forums for like 4$ each but you’d need alot of buyers and alot of ppl are doing this already. But yeah mining is also a good idea however u’d need alot of pcs that are strong
 
  • +1
Reactions: Greypiller
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use
no need to learn anything
js use NjRAT - Green Edition (preferably) -


1752168276759
 
  • +1
  • JFL
Reactions: penaldinho and Greypiller
Yeah u could sell the logs however they’re probably not high quality and a couple bucks,

What you could do is export every netflix and spotify account from the pc’s and sell them on forums for like 4$ each but you’d need alot of buyers and alot of ppl are doing this already. But yeah mining is also a good idea however u’d need alot of pcs that are strong
mining xmr is actually a pretty solid idea , its just finding the right group of people with good pcs:feelswat:. hence why usually its worth targeting the cheat market as many people there are 12 year olds with rtx 4090s jfl, i mean then again you could also add ransomware functionality
 
  • +1
Reactions: kurd
  • Hmm...
Reactions: bloodymanor
@deadstock @PseudoMaxxer @Jason Voorhees @rape
 
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

I used to skid rats from github when I was like 13 and share it as minecraft and roblox cheats and steal their robux and mc accounts or blackmail them to not doxx their whole identity
the grabber I was using used to steal their card and crypto information (usually their parents) but I was too scared to use them
I might start doing that again for mining and shit idk
 
  • +1
Reactions: Greypiller
I used to skid rats from github when I was like 13 and share it as minecraft and roblox cheats and steal their robux and mc accounts or blackmail them to not doxx their whole identity
the grabber I was using used to steal their card and crypto information (usually their parents) but I was too scared to use them
I might start doing that again for mining and shit idk
i wouldnt recommend skidding rats from github , as they are usually backdoored themselves and detected lol . warzone rat seems like a solid option as ive heard on dread but im paranoid as fuck and wouldnt trust it:feelswat:
 
  • +1
Reactions: yadih
 
@deadstock @Gaygymmaxx @RODEBLUR
 
literally specified it was a cutdown guide for beginners:p
What beginner is going onto looksmax.org to learn how to rat idiots on discord.

Plus the retards on here can't even install a updated browser
 
  • JFL
Reactions: Greypiller
This post severely. underestimates modern antivirus systems. Also malware development is quite complex. I dont know much about it but is certainly not something you can learn in just a few weeks.
 
  • +1
Reactions: penaldinho, tit and Greypiller
What beginner is going onto looksmax.org to learn how to rat idiots on discord.

Plus the retards on here can't even install a updated browser
irrelevant but by any chance do you know who filler is , does the username ring a bell ?:feelswat:
 
This post severely. underestimates modern antivirus systems. Also malware development is quite complex. I dont know much about it but is certainly not something you can learn in just a few weeks.
its a basic guide , i made it simple on purpose so beginners can learn the basic frameworks. they can do their own research if they want to learn how to bypass avs
 
  • +1
Reactions: Jason Voorhees
just steal people from there money instead :unsure:
 
This post severely. underestimates modern antivirus systems. Also malware development is quite complex. I dont know much about it but is certainly not something you can learn in just a few weeks.
Yeah, ideally if you are a noob it would be better to work as a malware spreader for commission rather than writing your own malware.
 
  • +1
Reactions: Greypiller
Yeah, ideally if you are a noob it would be better to work as a malware spreader for commission rather than writing your own malware.
yea this is just a cut down version , i wasnt trying to overcomplicate it :smonk:
 
  • +1
Reactions: tit
Ironically its lower effort to just sell scam courses. Creating a RAT needs a lot of experience in programming and you need to learn a lot of advanced stuff like obfuscation, polymorphism to bypass EDR tools. Like a deep knowledge of Operatins Systems, cryptography. These are not things you can learn just for thr heck of it.

Yeah, ideally if you are a noob it would be better to work as a malware spreader for commission rather than writing your own malware.
 
  • +1
Reactions: tit and Greypiller
Ironically its lower effort to just sell scam courses. Creating a RAT needs a lot of experience in programming and you need to learn a lot of advanced stuff like obfuscation, polymorphism to bypass EDR tools. Like a deep knowledge of Operatins Systems, cryptography. These are not things you can learn just for thr heck of it.
the @Clavicular method:lul:
 
  • +1
  • JFL
Reactions: Jason Voorhees and 1vot
  • +1
Reactions: Greypiller
i wouldnt recommend skidding rats from github , as they are usually backdoored themselves and detected lol . warzone rat seems like a solid option as ive heard on dread but im paranoid as fuck and wouldnt trust it:feelswat:
yea I even got ratted and my discord acc was stolen once after that I realized nobody suspects while trying to download a virus that they can control then I started sharing my shi in hacking discords as a rat maker
I've always tried to make one for android but couldn't find one that worked u can usually control their phone and shit if you can aciset it up
 
You weren't right about shit:forcedsmile:
either im tweaking or you and him are the same person , the timing just feels too good to be true:feelswat:
 

Similar threads

Il Slvione
Replies
17
Views
861
Untermensch5
Untermensch5
leF
Replies
22
Views
927
chickencalves
chickencalves
Greypiller
Replies
39
Views
360
Greypiller
Greypiller
lestoa
Replies
38
Views
677
dongle344
dongle344

Users who are viewing this thread

  • EmptyWaterBottle
Back
Top