Skip to content

Mikasuru/KukuriMalware

Repository files navigation

Kukuri Malware Project

⚠️ FOR EDUCATIONAL PURPOSES ONLY ⚠️
This project demonstrates malware behavior for science education.
The code might not perfect.

🎯 Project Goals

🔍 Understanding Learn malware persistence mechanisms and Windows internals
🌐 Networking Study communication patterns and C2 infrastructure
🛡️ Defense Practice cybersecurity defense techniques

⚙️ Features

  • Process Control

    • Remote command execution
    • Process manipulation (crash/freeze)
    • System monitoring
  • System Access

    • Network connection control
    • Volume manipulation
    • Screen capture
    • File system operations

🔒 Security Controls

  • No data exfiltration
  • No encryption features
  • No propagation mechanisms

💻 Requirements

- Windows 10/11
- Visual Studio 2022
- C++20
- Administrator privileges

🚀 Installation

  1. Clone repository
  2. Open Kukuri Helper.sln in Visual Studio
  3. Build solution in Release mode
  4. Run as Administrator
  5. Open Server folder
  6. Run bun Main.js

⚡ Quick Start

// Setup command & control
const string webhookUrl = "your-webhook-url";
Payload::SendMessage(webhookUrl, "Test message");

// Create embedded message
Payload::Embed embed;
embed.title = "Test Embed";
embed.description = "Embedded message";
Payload::SendEmbed(webhookUrl, embed);

🔧 Removal Tool

A removal script is provided to clean the system:

  • Terminates malware processes
  • Removes startup entries
  • Cleans registry modifications
  • Deletes temporary files
  • Restores system settings

⚠️ Disclaimer

This code is published for educational purposes as part of a controlled classroom environment. Any use outside of authorized educational contexts is strictly prohibited.

Made with ❤️ | By Mikasuru

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published