👾
Malware Development Guide
  • 🚀Introduction
  • 🐤Baby Steps
    • 📔Pre-requisite Knowledge
    • What is Malware?
    • Programming Guide
    • Vulnerability Analysis
  • 👾Basic Malware
    • Fork Bombs
    • Logical Bombs
    • Zip Bombs
    • Keyloggers
    • Wipers
    • ScreenJackers
    • Prependers and Postpenders
    • What's Next?
  • 💀Intermediate Malware
    • Browser Extensions
    • Worms
    • RATs
  • ☠️Advanced Malware
    • Botnets w/ C2 Servers
    • Rootkits and Bootkits
    • Polymorphic Malware
  • Appendix
    • Pivoting
      • Windows: Effing Drivers
      • Windows: Abusing LSASS
    • Elementary Concepts and Stuff
      • Memory Representation
      • Expressions
    • Being Stealthy
      • UAC Evasion
      • OPSEC
      • Code Obfuscation
      • Signing Code and Binary Properties
      • Punycodes
    • Backdoors
    • Windows Process Injection
    • SIM Swapping
    • Quishing
    • RunPE
    • Malware Packers
    • Learning Resources
  • Updates n Stuff
  • Scratchpad
Powered by GitBook
On this page
  • References
  1. Intermediate Malware

Worms

PreviousBrowser ExtensionsNextRATs

Last updated 1 year ago

Worms are quite simple on surface level. They're just self-propagating programs that usually just target a particular network by exploiting some kind of vulnerability and infect each device on the nework progressively.

A worm can be used to do all sorts of stuff, including but not limited to: spying, destruction, trolling, DoS/DDoS, etc.

References

  • For payloads:

  • An interesting read:

💀
https://en.wikipedia.org/wiki/Computer_worm
https://shantoroy.com/security/write-a-virus-in-python/
https://shantoroy.com/security/write-a-worm-malware-in-python/
https://github.com/keniel123/Worm
https://github.com/redcode-labs/Neurax
https://github.com/pylyf/NetWorm
https://github.com/go-bindata/go-bindata
https://www.mdpi.com/1424-8220/20/2/556