Greypillers Ultimative RATTING guide (How to make a simple passive income using malware)

How I feel after watching a ProfessorMesser video on TCP and UDP
 
  • +1
  • JFL
Reactions: penaldinho, Toddricus and Greypiller
For professionals malware's c++ and c is the choice
 
  • +1
Reactions: Greypiller
I made roughly
$5 and some worthless documents
with rats a few years ago
 
  • So Sad
Reactions: Greypiller
Many replies already. But I have been studying C++ for years, and I can attest that it is the most functional language other then maybe Rust, or something similar. It’s also very simple and easy to learn if you understand 8th grade math, and 6th grade english. ❤️

Stealing rats, and editing them is EVEN easier. Most choose this option.
 
  • +1
Reactions: Greypiller
RATTING GUIDE (Simplified for dummies)
View attachment 3906655
before i start this guide i would like to mention that this isnt a "full guide" but rather a simple instruction on how to so dont start barking in replies that i didnt include x rat type or x type of obfisticuation method(im not a proffesional or super expierenced but i will try my best to explain it).


Introduction :
What is a rat
Programming Languages
Code editors
Networking
How to punch windows defender/triage and reverse engineering in the balls
Okay this all seems really great greypiller now how much do i make?
WHAT NOT TO DO
How to spread
File types

What is a remote access trojan?
a remote access trojan is to put it simply , a tool which allows you to control/monitor someones computer. it is a form of malware often spread via social engineering , exploits , 0days blablalbllblala so on. i recommend you study malware 1st , the basics of networking , basically everything beforehand and do not jump straight into ratting like a script kiddie.
here are some useful videos i recommend you watch to get some "very" basic information of what im talking about




Programming languages :
if you are looking for a programming language to study for making the rat you can theoretically use anything but here are the top choices in my opinion which you can use :

Python

View attachment 3906667

PROS :
Super easy to use
compatible as fuck
a fuck ton of libaries at your command
Cons :
pretty fucking slow
easy to reverse engineer/detect

C
View attachment 3906681
Pros :
versatile
great low level system access aka you can make more advanced rat functionalities
harder to decompile
great support
Cons :
Slightly more difficult
You need to allocate your own memory
less readable
all fun till you get 30+ syntax errors

C#
View attachment 3906685
PROS :
easy as fuck to learn and versatile
much more readable
easier error debugging
GREAT LANGUAGE FOR MAKING WINDOWS RATS
Cons :
Only good for making windows based rats
easier to detect
not as low level as you would like aka you cant access that much deeper shit if you were to add a rootkit for example
dependent on .net

C++
View attachment 3906703
Pros :
low level access
you can add whatever the fuck you want
basically unstoppable
Cons :
Makes you want to shoot yourself in the head after writing more than 5 lines of code


Code editors
You can pretty much use any code editor you want , however visual studio code is great however its lack of built in .exe compiler sucks , visual studio community edition makes this process alot easier thank god.

Networking :
Okay so theres a fuckton of ways you can make a c2 server for your rats but im just gonna cover the most common ways to keep this guide concise and readable.

Any sort of discord / telegram bot
View attachment 3906710
Pros :
easy to setup
cons :
everything else sucks ass

Tunneling
View attachment 3906718
Pros :
no additional resources needed
you can host off basically any device
moderately easy to setup
free
firewalls wont rape you
cons :
makes it easier for reverse engineers/ feds to find shit about you since your hosting off a device based on your ip
resource intensive


Vps/server
View attachment 3906726
Pros:
secure
more privacy
no need to host off your own devices
a fuck ton of other benefits which im too lazy to list
Cons :
prone to takedown
expensive



How to punch windows defender/Triage in the balls.

Im not gonna be covering every single encryption technique here as i think you should be smart enough to do your own research:) , here are a few basic terms you need to know.

Obfuscation : modifying the code making it harder for avs to detect.
Stub : another .exe which is used to act as a decoy and decrypt the payload
Packing : compressing/encrypting the payload in order to avoid avs.
reverse shell : opening a shell from the targets computer itself to your c2.
Process hollowing : injecting itself into another process.

View attachment 3906735

Okay greypiller this all sounds really cool man now how many racks am i gonna be making
View attachment 3906738

Im gonna be completely honest , this all depends on the quality of your rat and if you advertise it properly. However an estimation for a decently sized operation . you would be making 1500$ aproximate with 100 machines mining xmr and about another 500$ in stolen banking details , crypto etc (CAN BE MORE IF YOUR LUCKY)

WHAT NOT TO DO
View attachment 3906745
Dont be a skid and download a premade rat or entirely vibe code it (while i dont support it , you can use ai to help you with debugging your code if your really shit) you will get backdoored , so instead of ratting niggers YOUR pc gets ratted instead:feelsuhh:. Buying rats is also a bad idea considering you can get scammed so in my opinion make the rat yourself:smonk:

How to spread????:soy::soy::soy:

View attachment 3906753
This is the part you gotta be good at or your rat will miserably fail:feelswat:
My advice personally is to set up a good social engineering site for some sort of hacking tool , cheat etc , maybe even a fake crypto wallet app.
i was too lazy to list the rest of the ways so i got ai to make a song about it :

View attachment 3906775




Which file types have potential for ratting

.exes
(obviously duh)

View attachment 3906781
.dlls
View attachment 3906783
pdfs using vulnerabilities
View attachment 3906789
remember no file type is completely untouchable for ratting potential , you just need to expirement.


Anyway hope you lads enjoyed this concise and quick guide , greypiller out:smonk:

Nice thread, why didn't you mention uefi rootkit. 90% of people don't even know how to delete it
 
  • Woah
Reactions: Greypiller
Nice thread, why didn't you mention uefi rootkit. 90% of people don't even know how to delete it
i made it very simple on purpose , also to make a uefi rootkit would take alot of knowledge in assembly and would be hard to make:feelspepo:
 

Similar threads

Il Slvione
Replies
17
Views
861
Untermensch5
Untermensch5
leF
Replies
22
Views
927
chickencalves
chickencalves
Greypiller
Replies
39
Views
360
Greypiller
Greypiller
lestoa
Replies
38
Views
677
dongle344
dongle344

Users who are viewing this thread

  • EmptyWaterBottle
Back
Top