MalEx is a malware execution automation script designed for cybersecurity research. It tests the effectiveness of antivirus software by executing malware samples and logging their detection status. Additionally, it includes an anti-phishing test to evaluate browser security against malicious URLs. Note that this script itself not malicious. However, you can use this script to execute any file on Windows platform and it basically checks whether the execution was successful or not and continues until the end.
This tool is designed for controlled environments such as virtual machines and sandboxed environments for cybersecurity research.
- Administrator Privileges Request: Ensures execution with elevated permissions.
- Anti-Phishing Test: Downloads and checks phishing URLs.
- Logging System: Records execution events and results.
- Process Management: Allows termination of malware processes (May not be effective at most cases).
- Automation of Execution: Categorizes and executes malware samples automatically (You need to rename them according to the syntax. The script itself have no logic to determine anything about any executable).
- Place MalEx in the parent directory of your malware samples.
- Run
MalEx.batwith administrative privileges.
- Select test type:
Afor malware execution,Bfor anti-phishing test. - Choose the malware category (Ransomware, Trojan, Virus, Worm, or All).
- Confirm execution.
- Review the log for results.
- More help is avaliable by pressing
?
- Execution details stored in
%temp%\MalEx\events.log. - Phishing URLs stored in
%temp%\MalEx\urls.txt(Phishing URLs resource: OpenPhish).
- This script executes potentially harmful files. Use in a controlled environment - a VM.
- Ensure proper authorization before running.
This project is licensed under the MIT License. See the LICENSE file for details.