Skip to content

RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾

Notifications You must be signed in to change notification settings

S12cybersecurity/RedNeuron

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

50 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

RedNeuron

RedNeuron is a Framework Creator of Malware, this framework it's focused in attacking Windows Machines but are created to execute the creator framework in Linux, you can use it in any Linux distribution you only need the necessary requeriments.

If you want to collaborate with code or ideas you can contact me in s12deff@gmail.com.

If you want to help the development of this tool with money, you can buy one suscription in Medium: https://medium.com/@s12deff/membership

It's developed in Kali Linux machine, and tested in Kali, Athena OS, Ubuntu and Parrot OS.

Actually in Version 1.6, the uniques 6 malwares options to create is a Undetectable Reverse Shell to bypass Windows Defender, and Persitence file using Run Register, also you have a ProcList tool to list all processes, also exists a FindWindow Tool that tool inject a reverse shell into a remote process via process Window Name, a MySQL Data Stealer using Triggers and C2 Server ,latest tool inside RedNeuron its File Extractor, this tool are developed mainly with 3 languages:

  • C++
  • Python
  • Bash

This tool have a shell to use and move inside RedNeuron, in this moment only have three sections

  • Main
  • Create
  • PostExploitation

Future Malware tools:

  • C2 Server
  • KeyLogger
  • Ransomware

image

Installation

Clone this repository:

git clone https://github.com/S12cybersecurity/RedNeuron

Install requeriments:

apt update && apt install python2 && apt install g++-mingw-w64

If you don't have Metasploit you need to install.

Guide: https://adamtheautomator.com/install-metasploit-on-ubuntu/

Set RedNeuron as executable

chmod +x RedNeuron

Python2 requeriments

wget https://bootstrap.pypa.io/pip/2.7/get-pip.py

python2 get-pip.py

pip2 install pycryptodome

Compile

The code it's compiled, but if you want to compile run this command:

gcc redneuron.cpp -lstdc++ -Wwrite-strings -o RedNeuron

Usage

Execute ./RedNeuron

image

If you want to create malware, you execute create command:

image

With list command you can see all available malware:

image

Create Undetectable Windows Reverse Shell:

image

Create Windows Persistence File:

image

Create ProcList EXE:

image

Now execute in Victim machine!

WindowInjector

Run WindowInjector command:

image

image

And Now Execute in Victim machine:

image

image

And get the reverse shell:

image

File Extractor

First enter to postexplotation shell:

image

Then execute file-extractor command:

image

Now you have in your directory the exe to execute in windows machine to transfer a file to RedNeuron.

You only need to provide the information. And its listening:

image

And in Windows Machine execute it:

image

image

And here you have your transfered file

MySQL Data Stealer:

First of all, this tool its post-exploitation, to enter it we need to execute postexploitation command:

image

And now execute mysql-stealer:

image

To use it you can check this Medium Post about it!

https://medium.com/@s12deff/mysql-data-stealer-hacking-mysql-26b960bb7d10

About

RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾

Resources

Stars

Watchers

Forks

Packages