PingRAT – Secretly Passes C2 Traffic Through Firewalls Using ICMP Payloads


PingRAT secretly passes C2 traffic through firewalls using ICMP payloads.


  • Uses ICMP for Command and Control
  • Undetectable by most AV/EDR solutions
  • Written in Go


Download the binaries

or build the binaries and you are ready to go:

$ git clone
$ go build client.go
$ go build server.go



./server -h
Usage of ./server:
-d string
Destination IP address
-i string
Listener (virtual) Network Interface (e.g. eth0)


./client -h
Usage of ./client:
-d string
Destination IP address
-i string
(Virtual) Network Interface (e.g., eth0)

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.