Skip to content

Commit b0c8c24

Browse files
committed
Repo Structure
Made changes on Readme file and added a new Download option to download All sub directly. Try: https://maldev.5mukx.site
1 parent f91454e commit b0c8c24

File tree

4 files changed

+81
-24
lines changed

4 files changed

+81
-24
lines changed

DEPENPENCIES.md

Lines changed: 41 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,41 @@
1+
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
2+
3+
**Copy the dependencics in Cargo.toml file**
4+
5+
```rust
6+
[dependencies]
7+
winapi = { version = "0.3", features = [
8+
"winuser",
9+
"setupapi",
10+
"dbghelp",
11+
"wlanapi",
12+
"winnls",
13+
"wincon",
14+
"fileapi",
15+
"sysinfoapi",
16+
"fibersapi",
17+
"debugapi",
18+
"winerror",
19+
"wininet",
20+
"winhttp",
21+
"synchapi",
22+
"securitybaseapi",
23+
"wincrypt",
24+
"psapi",
25+
"tlhelp32",
26+
"heapapi",
27+
"shellapi",
28+
"memoryapi",
29+
"processthreadsapi",
30+
"errhandlingapi",
31+
"winbase",
32+
"handleapi",
33+
"synchapi",
34+
] }
35+
ntapi = "0.4"
36+
37+
```
38+
39+
> Tips for Rust Beginners: Copy and save the dependencies in Cargo.toml File. Versions may be different. Just copy the features when testing.
40+
41+
To Go [Back](./README.md).

Malware-Samples/Encryfer/Encryfer-X/README.md

Lines changed: 12 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,11 @@ Pronounciation: **En-cry-fer-X**
1111
Created By [@5mukx](https://x.com/5mukx)
1212
<br>
1313
</div>
14+
1415
Algorith Used : AES256 + chacha20poly1305
1516

17+
> ⚠️Note⚠️: This is an early stage of the ransomware created for fun and learning purpose. This program is not created to harm or dispute others. A Lot of changes has been done in the private repository. I will be releasing with the advance syscalls techniques.
18+
1619
### Features of Encryfer-X
1720

1821
* Data Encryption using Parallelism . [For Stealthy and Fast W]
@@ -38,22 +41,27 @@ Future Plans:
3841
3942
> ⚠️Note⚠️: By Default I have Enabled all features. Including Recursive Volume Encryption. To test this Ransomware comment or modify the functions !.
4043
41-
Build the following code.
44+
To Build the following code.
4245

43-
```
46+
47+
```rust
4448
cargo build --release
4549
```
4650

4751
You can find the Binary file at: `./target/release/Encryfer-X.exe`
4852

49-
To see the demo video check my tweet: [Tweet](https://x.com/5mukx/status/1829094735988076900)
50-
5153
> ⚠️Note⚠️: You need the Following 2 THings: AES wit 32.len() + Encrypted Hex Value that contains AES256 with chacha !.
5254
55+
To see the demo video check my tweet: [Tweet](https://x.com/5mukx/status/1829094735988076900)
56+
5357
For Decryption: [Encryfer-X-Decryptor](../Encyfer-X-Decryptor/)<br>
5458
To Generate Keys: [Random-Keys-Generator](../Random-Keys-Generator/)
5559

5660
For More Offensive codes. Visit [Rust For Malware Development](https://github.com/Whitecat18/Rust-for-Malware-Development)
5761

62+
To Download Bundle [Decryptor + Key Generator](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples/Encryfer)
63+
64+
To download this: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples/Encryfer/Encryfer-X)
65+
5866
For more Quality Resources Follow me on X: [@5mukx](https://x.com/5mukx)
5967

Malware-Samples/README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
## Malware Playground
2+
3+
Welcome. Here you can the real word cases of using malwares. By using using these PoC.
4+
5+
* [Dropper](./dropper/)
6+
* [Encryfer-X Ransomware](./Encryfer/Encryfer-X/)
7+
* [Information Gathering](./Information%20Gathering/)
8+
* [InfoStealer Malware](./InfoStealer/)
9+
10+
Visit in Repository: [Visit](https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples)
11+
12+
Download This Malware Paygrounds as .zip: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples)

README.md

Lines changed: 16 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,16 @@
1313

1414
---------------------
1515

16-
> Note: These are my own research and implementations, derived from the original authors' work. If you discover any errors in these codes, please [contact](https://x.com/5mukx) or contribute to this repository.
16+
## Table of Contexts
17+
18+
- [Rust for Malware Development](#rust-for-malware-development)
19+
* [Walkthrough](#beginner-path)
20+
* [Malware Techniques](#techniques)
21+
* [Malware Encryption Techniques](#encryption-techniques)
22+
* [Malwre Blogs Regarding the Repository](#rust-malware-blogs-regarding-this-repostitory)
1723

18-
---------------------
1924

20-
## Context
25+
## Malware Techniques
2126

2227
| Techniques | Description |
2328
|-----------------------------------------------------------|-----------------------------------------------------------------------------|
@@ -79,25 +84,16 @@
7984
| [ECC Encryption](./Encryption%20Methods/ecc_shellcode_exec/) | Encrypt and Decrypt Shellcodes/Payloads using ECC (Elliptic Curve Cryptography) |
8085
| [SystemFunction032/033](./Encryption%20Methods/SystemFunction032_033/) | Encrypt and Decrypt shellcode using undocumented winapi function. |
8186

87+
-------------
8288

89+
Click Here to download the Repository: **[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development)**
8390

84-
Click Here to download the Repository: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development)
85-
86-
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
87-
88-
**Copy the dependencics in Cargo.toml file**
89-
90-
```rust
91-
[dependencies]
92-
winapi = { version = "0.3.9", features = ["winuser","setupapi","dbghelp","wlanapi","winnls","wincon","fileapi","sysinfoapi", "fibersapi","debugapi","winerror", "wininet" , "winhttp" ,"synchapi","securitybaseapi","wincrypt","psapi", "tlhelp32", "heapapi","shellapi", "memoryapi", "processthreadsapi", "errhandlingapi", "winbase", "handleapi", "synchapi"] }
93-
ntapi = "0.4.1"
94-
```
9591

96-
> Tips for Rust Beginners: Copy and save the dependencies in Cargo.toml File. Versions may be different. Just copy the features when testing.
92+
## Walkthrough
9793

9894
* New to Rust ? : Please Follow the steps here **[Compile](./deps.md)**
9995
* How to Compile this Repository Source Codes **[README](./deps.md)**
100-
* How to clean all the PoC recursively **[Commands](./CLEAN.md)**
96+
* How to clean all the PoC recursively **[Commands](./CLEAN.md).**
10197
* **Cross Compilation Using Docker [READMe](./docker.md).**
10298

10399
--------
@@ -108,11 +104,11 @@ ntapi = "0.4.1"
108104

109105
* [Rust for CyberSecurity and Red Teaming](https://infosecwriteups.com/rust-for-cyber-security-and-red-teaming-275595d3fdec)
110106

111-
* [DLL Injection using Rust](https://smukx.medium.com/dll-injection-using-rust-593b83734c90)
107+
* [DLL Injection using Rust](./dll_injection/)
112108

113-
⚠️ These Resources are only for Education Purposes Only ⚠️
109+
## Disclaimer
114110

111+
⚠️ These Resources are only for Education Purposes Only. ⚠️
115112

116-
## Please Note
113+
If you need an exploit or proof-of-concept (PoC) removed, please contact me via email at **[email protected]** or through my Twitter handle [@5mukx](https://x.com/5mukx).
117114

118-
If you need an exploit or proof-of-concept (PoC) removed, please contact me via email at [[email protected] (mailto:[email protected])] or through my Twitter handle [@5mukx](https://x.com/5mukx)

0 commit comments

Comments
 (0)