Skip to content

Latest commit

 

History

History
91 lines (67 loc) · 3 KB

README.md

File metadata and controls

91 lines (67 loc) · 3 KB

Multifunctional_Malware


Multifunctional Malware

This repository contains a Python-based multifunctional malware designed for ethical hacking and cybersecurity education. The script incorporates several modules, each fulfilling a different task, to demonstrate various aspects of malware operation and defense evasion. Use this tool only for authorized testing and educational purposes.


Table of Contents


Overview

The Multifunctional_Malware project provides an insight into how certain functionalities commonly found in malware operate, such as data exfiltration, system info gathering, and process management. This repository is intended for educational purposes, enabling cybersecurity professionals and students to understand malware behavior, potential vulnerabilities, and ways to mitigate them.


Features

  • System Information Gathering
  • Keylogging
  • Data Exfiltration
  • Persistence Techniques
  • Network Reconnaissance

Each feature simulates aspects of malware that real-world adversaries might deploy, enabling a comprehensive study for red and blue team exercises.


Installation

Prerequisites

  • Python 3.x
  • pip package manager

Steps

  1. Clone the repository:
    git clone https://github.com/grayshader3020/Multifunctional_Malware.git
  2. Navigate into the project directory:
    cd Multifunctional_Malware
  3. Install required Python packages:
    pip install -r requirements.txt

Usage

Running the Malware Script which is client.py here.

To run the malware script, execute the following command:

python malware_script.py

The script will prompt you to select a module to execute. Follow the on-screen instructions to perform tasks specific to each module.

Command-line Arguments

Run the script with --help to display available command-line options:

python malware_script.py --help

Modules

Below is a list of the primary modules included in this malware and their respective functionalities:

  1. System Information Gathering: Collects details about the system’s hardware, operating system, and network configuration.
  2. Keylogging: Logs keystrokes from the user and stores them in a specified file.
  3. Data Exfiltration: Simulates data theft by encrypting and transmitting files to a remote server.
  4. Persistence Mechanisms: Implements basic techniques to maintain persistence on the system.
  5. Network Reconnaissance: Scans the network for open ports and active devices to gather reconnaissance information.

Each module is self-contained, making it easy to understand and modify individual functions.


Disclaimer

This tool is strictly for educational and authorized security testing purposes. Unauthorized use is illegal and unethical. The author takes no responsibility for any misuse of this tool.