-
Notifications
You must be signed in to change notification settings - Fork 2
Ranger11Danger/HTTP-Rat
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
once compiled just run the binary './malware' and it will start to run in the background It is very easy to interact with the Rat, it uses http requests to get a command to be ran from a web server.
The Rat requests the file from the webserver, and then stores and executes the command from memory nothing
touches disc except the malware. Before using the malware make sure you change the webserver address in the code. The malware at this point is very simple to remove just sending a kill command to the pid will do. I have also added
a lock file in /tmp called malware.lock executing "kill 'cat malware.lock'" will also kill the process I used this blog post to daemonize the malware
About
RAT that uses http to get commands
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published