This repository contains a Python-based multifunctional malware designed for ethical hacking and cybersecurity education. The script incorporates several modules, each fulfilling a different task, to demonstrate various aspects of malware operation and defense evasion. Use this tool only for authorized testing and educational purposes.
The Multifunctional_Malware
project provides an insight into how certain functionalities commonly found in malware operate, such as data exfiltration, system info gathering, and process management. This repository is intended for educational purposes, enabling cybersecurity professionals and students to understand malware behavior, potential vulnerabilities, and ways to mitigate them.
- System Information Gathering
- Keylogging
- Data Exfiltration
- Persistence Techniques
- Network Reconnaissance
Each feature simulates aspects of malware that real-world adversaries might deploy, enabling a comprehensive study for red and blue team exercises.
- Python 3.x
pip
package manager
- Clone the repository:
git clone https://github.com/grayshader3020/Multifunctional_Malware.git
- Navigate into the project directory:
cd Multifunctional_Malware
- Install required Python packages:
pip install -r requirements.txt
To run the malware script, execute the following command:
python malware_script.py
The script will prompt you to select a module to execute. Follow the on-screen instructions to perform tasks specific to each module.
Run the script with --help
to display available command-line options:
python malware_script.py --help
Below is a list of the primary modules included in this malware and their respective functionalities:
- System Information Gathering: Collects details about the system’s hardware, operating system, and network configuration.
- Keylogging: Logs keystrokes from the user and stores them in a specified file.
- Data Exfiltration: Simulates data theft by encrypting and transmitting files to a remote server.
- Persistence Mechanisms: Implements basic techniques to maintain persistence on the system.
- Network Reconnaissance: Scans the network for open ports and active devices to gather reconnaissance information.
Each module is self-contained, making it easy to understand and modify individual functions.
This tool is strictly for educational and authorized security testing purposes. Unauthorized use is illegal and unethical. The author takes no responsibility for any misuse of this tool.