This README is formatted with descriptions for each program. ITS EDUCATIONAL I SWEAR DO NOT REPRODUCE THIS OR UNLAWFULLY DISTRIBUTE IT
This code represents a basic Python virus. It replicates by creating a new binary executable with a randomly generated filename, achieved through:
-Importing necessary modules: argv from sys, choice, and randint from random. -Generating a random filename of 4 to 8 characters with a lambda function. -Reading the current script file and writing its content to a new file with the generated filename, effectively spreading as a virus.
In summary, this code creates a copy of itself with a randomly generated filename ending with ".exe", effectively spreading as a virus.
This script attempts to inject a DLL named "injrcted.dll" into the "explorer.exe" process using the Windows API functions provided by ctypes.windll.kernel32
. It first loads the DLL file, retrieves the process ID (PID) of the "explorer.exe" process, opens a handle to that process, allocates memory within it, writes the DLL file into the allocated memory, and finally creates a remote thread within the process to execute the DLL.
This code defines a class named Worm
, which represents a worm-like malware capable of replicating itself and other files. It initializes with parameters such as path, target directories list, and iteration. The list_directories
method recursively lists directories and files, excluding hidden files/directories, while create_new_worm
method is intended to create a copy of the script in each target directory.
Overall, this code provides the foundation for a worm malware that can traverse directories and replicate itself, but it lacks the complete functionality.
This C++ code represents a simple self-replicating program. It generates a random filename, reads the content of the current script file, creates a new file with the generated filename, and writes the script content into it. The generated filename has a random length between 4 and 8 characters, followed by the ".exe" extension.
This C++ code defines a worm-like program capable of recursively listing directories, avoiding hidden files, and creating new copies of itself in each target directory. It utilizes the <filesystem>
library introduced in C++17. The Worm
class has methods to list directories and create new worm copies, while the main
function initializes the program and starts the worm actions.
Overall, this code represents a self-replicating program capable of spreading itself by creating copies in multiple directories while avoiding hidden files/directories.
This README provides an overview of each program and its functionality.