RATel : An Open Source Penetration Test Tool

RAT-el is an open source penetration test tool that allows you to take control of a windows machine. It works on the client-server model, the server sends commands and the client executes the commands and sends the result back to the server. The client is completely undetectable by anti-virus software.

Screenshots

Added Features

  • Unicode management (20.02.21) for the version: beta_v0.1

Features

  • RATelServer:
    • Multiple Connections
    • Broadcast commands to all clients
    • Stores client informations in the database
    • Encryption of data on the network via XOR
    • Token management system to identify clients
    • Unicode management
  • Client:
    • Encryption of data send over the network
    • Startup persistence
    • Remote command execution via CMD
    • Remote command execution via Powershell
    • Encryption of data on the network via XOR
    • Automatic persistence when running the client
    • Automatic reconnection
    • Unicode management
  • RATelGenerator:
    • Automatic client compilation

Future Features

  • Keylogger for the version: beta_v0.2

Disclaimer

To prevent RATel from being detected by antivirus, please do not upload the payload to TOTAL VIRUS. Each month I will test myself if the payload gets detected by antivirus. So you’ll have a photo every month to prove RAtel discretion.

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

1 week ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

1 week ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

2 weeks ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

2 months ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago