Skip to content

Mikasuru/KukuriMalware

Repository files navigation

Kukuri Malware Project

⚠️ FOR EDUCATIONAL PURPOSES ONLY ⚠️
This project demonstrates malware behavior for science education.
The code might not perfect.

🎯 Project Goals

πŸ” Understanding Learn malware persistence mechanisms and Windows internals
🌐 Networking Study communication patterns and C2 infrastructure
πŸ›‘οΈ Defense Practice cybersecurity defense techniques

βš™οΈ Features

  • Process Control

    • Remote command execution
    • Process manipulation (crash/freeze)
    • System monitoring
  • System Access

    • Network connection control
    • Volume manipulation
    • Screen capture
    • File system operations

πŸ”’ Security Controls

  • No data exfiltration
  • No encryption features
  • No propagation mechanisms

πŸ’» Requirements

- Windows 10/11
- Visual Studio 2022
- C++20
- Administrator privileges

πŸš€ Installation

  1. Clone repository
  2. Open Kukuri Helper.sln in Visual Studio
  3. Build solution in Release mode
  4. Run as Administrator
  5. Open Server folder
  6. Run bun Main.js

⚑ Quick Start

// Setup command & control
const string webhookUrl = "your-webhook-url";
Payload::SendMessage(webhookUrl, "Test message");

// Create embedded message
Payload::Embed embed;
embed.title = "Test Embed";
embed.description = "Embedded message";
Payload::SendEmbed(webhookUrl, embed);

πŸ”§ Removal Tool

A removal script is provided to clean the system:

  • Terminates malware processes
  • Removes startup entries
  • Cleans registry modifications
  • Deletes temporary files
  • Restores system settings

⚠️ Disclaimer

This code is published for educational purposes as part of a controlled classroom environment. Any use outside of authorized educational contexts is strictly prohibited.

Made with ❀️ | By Mikasuru

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published