Few things to NOTE 📝👇
- Dont deploy on your personal machine. These stuff can go on to infect other devices in your network.
- If there is a password on the ZIP(coz vx-underground)....the password is 'infected'.....without the quotes....offcourse🤭
- Some are .ex_ intead of .exe to avoid accidental deployment by double clicking
The malware in this repo is either:
1. FEW: Built by me 🤭
2. SOME: Analysed by me ⚡
3. A FEW: Acquired and retrieved during threat hunting and threat intelligence ☄️
4. MOST: Shared/Sourced from other malware researchers 😊 VX-UNDERGROUND, KASPERSKY, LIFKA, JOHN HAMMOND, CTFs...and a few others😊
👉 There are over a thousand malware samples in this repository from simple fireworks to weapons-of-mass-destruction.
👉 To reverse Engineer these samples, you can use Ghidra, Responder, IDApro.
👉 Ensure you have the necessary support environment installed i.e JDK, Python3, Ruby etc
👉 All source code which is packaged may or may not be set with the password 'infected' (without the '). Individual files are likely not packaged.
To the maximum extent permitted by applicable law, I, Moran Cybersecurity group and/or affiliates who have submitted content to this repo, shall not be liable for any indirect, incidental, special, consequential or punitive damages, or any loss of profits or revenue, whether incurred directly or indirectly, or any loss of data, use, goodwill, or other intangible losses, resulting from:
👉 (i) your access to this resource and/or inability to access this resource;
👉 (ii) any conduct or content of any third party referenced by this resource, including, any offensive or illegal conduct or other users or third parties;
👉 (iii) any content obtained from this resource or any of its resources