TheFatRat
by screetsec
TheFatRat is an automated exploitation tool that generates backdoors and payloads capable of bypassing most antivirus software for multiple operating systems.
Thefatrat a massive exploiting tool : Easy tool to generate backdoor and easy tool to post exploitation attack like browser attack and etc . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .
Primary Use Case
TheFatRat is primarily used by penetration testers and red teamers to create custom backdoors and payloads for post-exploitation activities on Windows, Linux, Mac, and Android systems. It simplifies the process of generating malware that can evade antivirus detection and supports local or remote listener setups for effective control.
- Fully automates MSFvenom and Metasploit integration
- Generates backdoors and payloads for Windows, Linux, Mac, and Android
- Bypasses most antivirus software protections
- Supports local and remote listener generation
- Creates payloads in various formats
- Includes a file pumper to increase file size
- Detects external IP and network interface addresses
- Automatically generates AutoRun files for USB/CDROM exploitation
Installation
- git clone https://github.com/Screetsec/TheFatRat.git
- cd TheFatRat
- chmod +x setup.sh && ./setup.sh
Usage
>_ ./update && chmod +x setup.sh && ./setup.shUpdates TheFatRat repository and reinstalls the setup script.
>_ chmod +x chk_tools && ./chk_toolsRuns a troubleshooting script to check tool versions and provide solutions for setup issues.
- Integrate TheFatRat with Metasploit for streamlined payload generation and exploitation workflows.
- Use TheFatRat-generated payloads in red team exercises to simulate realistic attacker behaviors and test blue team detection capabilities.
- Leverage the tool's AV bypass features to evaluate and improve endpoint detection and response (EDR) solutions.
- Incorporate automated listener setups to enhance operational efficiency during engagements.
- Use the file pumper and AutoRun file generation features to test defenses against USB/CDROM-based infection vectors.
Docs Take 2 Hours. AI Takes 10 Seconds.
Ask anything about TheFatRat. Installation? Config? Troubleshooting? Get answers trained on real docs and GitHub issues—not generic ChatGPT fluff.
3 free chats per tool • Instant responses • No credit card
Related Tools
Awesome-Hacking
Hack-with-Github/Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
hackingtool
Z4nzu/hackingtool
ALL IN ONE Hacking Tool For Hackers
mitmproxy
mitmproxy/mitmproxy
An interactive TLS-capable intercepting HTTP proxy for penetration testers and software developers.
sqlmap
sqlmapproject/sqlmap
Automatic SQL injection and database takeover tool

metasploit-framework
rapid7/metasploit-framework
Metasploit Framework
h4cker
The-Art-of-Hacking/h4cker
This repository is maintained by Omar Santos (@santosomar) and includes thousands of resources related to ethical hacking, bug bounties, digital forensics and incident response (DFIR), AI security, vulnerability research, exploit development, reverse engineering, and more. 🔥 Also check: https://hackertraining.org
