Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      itsMe

      RATel: open source penetration test tool (undetectable by anti-virus software)

      Recommended Posts

      Staff

      Hidden Content

        Give reaction to this post to see the hidden content.

      RAT-el is an open-source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.

      Features

      RATelServer:

          Multiple Connections
          Broadcast commands to all clients
          Stores client information in the database
          Encryption of data on the network via XOR
          Token management system to identify clients

      Client:

          Encryption of data sent over the network
          Startup persistence
          Remote command execution via CMD
          Remote command execution via Powershell
          Encryption of data on the network via XOR
          Automatic persistence when running the client
          Automatic reconnection

      RATelGenerator:

          Automatic client compilation

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By Cyber_Bot
          TRY ON VM ONLY. Ryuk .Net Ransomware overwrites all files on the computer (It means nobody can ever return files back) and makes it at least 2 times faster than other ransomwares.It drops read_it.txt for startup folder and all folders which files has been encrypted. This project depends on your donation. Please donete if you want to see next releases in the future

          Hidden Content
          Give reaction to this post to see the hidden content. This ransomware can change file extension randomized or you can type your own extension. Write your own message and victim will see only that note. readme.txt wil be dropped on every folder which files has been encrypted

          Hidden Content
          Give reaction to this post to see the hidden content. Encrypted File seems like this

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. OWASP Nettacker project is created to automate information gathering, vulnerability scanning, and eventually generating a report for networks, including services, bugs, vulnerabilities, misconfigurations, and other information. This software will utilize TCP SYN, ACK, ICMP, and many other protocols in order to detect and bypass Firewall/IDS/IPS devices. By leveraging a unique method in OWASP Nettacker for discovering protected services and devices such as SCADA. It would make a competitive edge compared to other scanners making it one of the bests.
          Changelog v0.0.2
          Many bugs fixed in this release and we are aiming to stop supporting Python 2.7 after this release and restructure our framework to be faster and better.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. FuzzingTool
          FuzzingTool is a web penetration testing tool, that handles with fuzzing. After the test is completed, all possible vulnerable entries (and the response data) are saved on a report file.
          Changelog v3.11
          New features
              Allow to insert multiple wordlists (globally or per target)
                  Assign a wordlist to each target with numerous -w, or a global wordlist using only one -w;
                  Use multiple wordlists to same target -w 'wordlist1;wordlist2';
              Allow to wordlist plugins automatically detects and build their parameters based on target;
              Now both the exception and the used payload are written in the logfile;
              Added robots.txt plugin to the wordlists;
              Updated CLI output options
                  Added an option to disable the terminal colors --no-colors;
                  Added an option to simplify the output mode, removing the time label and reducing the other labels -S, --simple-output;
          CLI output changes
              Updated the program’s progress status: the format is more clean and shows the current payload that are being used;
              Updated the PathScanner status codes coloring;
          Bugfixes
              Fixed the proxy setup on Request;
              Fixed the Logger that wasn’t writting in the logfile;
              Fixed a bug then more than one method is specified to same target, and the application stops to run;
              Fixed an exception when the same target is setted more than one time. Now a target can appear more than one time if all of them do the same type of fuzzing, or by selecting a global scanner plugin;
          Exception handling
              At now, none of the RequestExceptions will stop the application, instead of it the program will ask for the user if he wants to continue with that target.
              The objectCreator method from PluginFactory no longer raises a PluginNotFound exception. This exception was transfered to the classCreator in the same factory.
          Code refatored
              All the program arguments parsing are now handled by ArgumentParser that extends the argparse.ArgumentParser;
              Separate the Dictionary class from the wordlists;
              Removed unused anonimous functions on CliOutput;
              The blacklist status codes, and actions, was moved to a separated class called BlacklistStatus;
              Removed the Response class. Now the Request object will return a tuple of items: the raw response from the requests library, and the RTT. The SubdomainRequest appends the target’s ip to this tuple;
              Moved the FuzzingTool results from the python dictionary to a separated class Result
                  The results are no longer created by the scanners;
                  Changed the getResult method from the scanners to inspectResult;
              Separated the Matcher from the scanners;
              Updated base classes to abstract classes;

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Practice Web Applications Hacking & Penetration Testing against a number of real world web applications/websites.
          What you'll learn
              Set Up a Lab Environment To Practice Hacking and Penetration Testing.
              Understand How Websites / web applications Work.
              Detect What Technologies / Scripts A Website Is Using.
              Intercepting HTTP Requests Using A Personal Proxy.
              Collect Sensitive Information About The Target.
              Web Applications Hacking / Websites Hacking.
              TOP 10 Web Applications / Websites Vulnerabilities and Website Related Hacking Techniques.
              Discover and Exploit Cross Site Scripting (XSS) Vulnerabilities.
              Detect and Exploit Cross Site Request Forgery (CSRF) Vulnerabilities.
              Discover and Exploit Command Execution Vulnerabilities.
              Uncover and Exploit SQL Injection Vulnerabilities.
              Uncover and Exploit Script Source Code Disclosure Vulnerabilities.
              Using Burp Suite Proxy.
              How To Use Vega (Web App / website Vulnerability Scanner) to Scan Websites.
              How To Use Arachni (Web Vulnerability Scanner) to Scan Websites.
              Answers to all of your questions about ethical hacking and penetration testing!
              Get A Job As A Penetration Tester / Ethical Hacker & Make Money Online As A Freelancer.
              The Ability To Hack And Pen Test Any Website / web application.
              Learn About The different fields of Web Applications Hacking.
          Requirements
              Basic Information Technology Skills.
              A Desire To Learn.
              Basic Knowledge Of Web Applications (not mandatory).
              Hacking Operating Systems: KALI LINUX, PARROT SECURITY OS, BACKBOX LINUX...etc
              No previous hacking knowledge required.
          Description
          This course includes all necessary information to start your carrier in the Cyber Security field. This course aims to teach you how to perform full penetration testing on web applications.
          JOIN OVER 11000 STUDENTS IN THE Website Hacking & Penetration Testing (Real World Hacking!) COURSE
          #############################################################################
              Web applications hacking course is not like other courses. I will not teach you the boring hacking stuff that you can get from Google.
              All the videos in this course are simple, short and practical.
              You will practice web applications Hacking / Penetration Testing against a number of real-world web applications.
              You will learn how to discover Web Applications vulnerabilities through Penetration Testing.
              You will learn how to hack the web security.
          I will start by teaching you the basics of any vulnerability and then exploiting it with pure technical skills. The web applications hacking and penetration testing course is designed to cover all the latest vulnerabilities of Web Applications like Web Applications Attacks, CSRF attacks, Injection attacks, and many more.
          In this course, we will answer the following questions:
          How do hackers hack websites?
          The Best Ways to Hack a Website.
          How to Hack a Web Application?
          In this course, you will learn the following:
          Hacking a website database.
          Hacking a website using sql injection.
          Website hacking by php source code.
          Website hacking exploits.
          Website ethical hacking.
          Website ethical hacking tools.
          Website hacking techniques.
          Ethical hacking tools.
          The ethical hacking process.
          Ethical hacking basics.
          OWASP top 10.

          *This Course Is For Educational Purposes Only*
          ------Don't be evil------

          Student reviews:
          ***********************************************
          I like the way the instructor is explaining the course. As of now I am happy with the contents and support I am receiving for my queries. This is one of the best courses on Udemy! ★★★★★
          ***********************************************
          Very good course, enjoying it so far. the instructor is, helpful, clear and direct to the point with practical tutorials.★★★★★
          ***********************************************
          Excellent course! The Course was amazing. I learned a lot of things about ethical hacking and the instructor was awesome. I think that the course is definitely worth way more than it's asking price. ★★★★★
          Who this course is for:
              Penetration testers
              Web developers
              IT admins and staff
              Anyone who wants to learn websites / web applications hacking
          Hidden Content
          Give reaction to this post to see the hidden content.

          Hidden Content
          Give reaction to this post to see the hidden content.