Warning! The malware covered in the following pages are real samples and can cause system damage. All information is for education and spreading awareness of how malware can affect systems along with the methods used to create malware. That1EthicalHacker is not responsible for any attempt to recreate or use malware on computers. This is strongly discouraged and should not be done without proper knowledge and precautions to ensure that everything happens within a controlled environment where nothing gets damaged outside the scope of a test.
Description
Malware, it is something that was created along with the internet! From old MsDOS floppy disk based Viruses to Creeper, the first Worm ever created! Malware will always be a part of the internet and subsequently our lives. While real, the malware discused has had parts removed or altered to ensure that nothing could be created directly as simple as a copy and paste from the following pages and topics. The methods while talked about in a high level can still be applied to understanding malware at a decent degree.
Project Index
Jack_Ketch
Jack_Ketch is a collection of malware samples designed to mimic ransomware. Mainly programed in Rust with some usage of the Windows 32 API and Python for some versions, it is by far the fastest file system enumeration I have programed. Using thread limiting with distributed file manipulation for fast file discovery and manipulation on file local systems.
Full coverage: Click here.
Border files
BorderDestroyer is a great person and content creator, he was kind enough to run some programs I have made along with giving me permission to hack into his personal computers. These files include remote access, info stealers, pop up spammers, Jack_Ketch and Hangman. (I know your reading this Border). Programed in C, Rust, Python, Batch and Visual Basic these files show just how versatile malware can be.
Full coverage: Click here.
ErroxPerms
ErroxPerms is a project designed to elivate privliges on Windows systems from a local user to NT\SYSTEM for payload staging. Programed mainly in Rust using some Windows 32 API, targeting services to ensure the malware gets staged.
Full coverage: Click here.
Hangman
Hangman is a file designed to be used as a MBR editor / Bootkit stager for Windows systems. Programed in C using the Windows 32 API to edit the drive directly for handling the MBR to disable or edit legacy BIOS enabled devices boot process.
Full coverage: Click here.
Socials:
Special thanks to:
- BorderDestroyer
- RussianSpy
- CCNA 1 teacher
- Rishik
- Cybersecurity teacher
- Computer science 1 teacher
And I do really mean thanks. Due to your support, testing, and advice regarding my programs it is possible that I even program! If it wasnt for your help, I would be working towards becoming an auto-mechanic (it's true)