⚠️ WARNING: This project contains educational demonstrations of potentially harmful code. Use only in isolated, controlled environments for learning purposes.
This repository contains educational demonstrations of simple computer viruses and malicious scripts created as part of a Network Security course in December 2020. These examples are designed to help students understand malware behavior patterns, replication mechanisms, and the importance of cybersecurity awareness.
This project serves as a hands-on learning tool for:
- Understanding how viruses replicate and spread
- Analyzing different types of malicious behaviors
- Learning defensive programming techniques
- Developing cybersecurity awareness
- Studying malware behavior patterns in a controlled environment
- Creates copies of itself with random names
- Executes the copied files
- Opens Google in the browser
- Demonstrates basic virus replication techniques
- Deletes all files from the G: drive
- Uses Windows command line operations
- Shows destructive malware behavior
- Creates infinite loop of message boxes
- Displays "salam" (Persian for "hello")
- Demonstrates system annoyance techniques
- Interactive counting virus with Persian text
- Endless loop of message boxes
- Asks user if they're tired yet
- Shows social engineering aspects
- Continuously speaks "ha ha ha"
- Uses Windows SAPI speech synthesis
- Demonstrates audio-based system annoyance
- Basic message box displaying "salam"
- Simple demonstration of VBScript execution
viruses.pdf
- Educational materials about computer virusesviruses.pptx
- Presentation slides on virus concepts
- These scripts are created exclusively for educational purposes
- They demonstrate potentially harmful behaviors
- DO NOT run on production systems or personal computers
- Use only in isolated, virtual environments
- Never execute on a real system
- Use virtual machines or sandboxed environments
- Ensure no important data is accessible
- Disconnect from networks when testing
- Understand the code before running
This project is intended for:
- Cybersecurity students
- Security researchers
- Educational institutions
- Controlled learning environments
Not intended for:
- Malicious purposes
- Production environments
- Unauthorized testing
- Harmful activities
By studying these examples, students can learn:
- Virus Replication: How malware copies itself
- System Interaction: How scripts interact with operating systems
- Social Engineering: Psychological manipulation techniques
- Defensive Programming: How to protect against such attacks
- Security Awareness: Understanding threat vectors
- Virtual Machine software (VirtualBox, VMware, etc.)
- Python 3.x installed
- Windows OS (for VBScript examples)
- Isolated network environment
- Create a new virtual machine
- Install Python 3.x
- Clone this repository
- Ensure no important data is accessible
- Disconnect from networks
# In your isolated VM
python s01.py # Will create copies and open browser
# In your isolated VM
cscript box.vbs # Will show message boxes
- ✅ Educational demonstrations complete
- ✅ Documentation provided
- ✅ Safety warnings implemented
- 🔄 Future enhancements planned
- Python 3.x
- Windows OS (for VBScript examples)
- Virtual machine or isolated environment
- Python (.py): Cross-platform scripting
- VBScript (.vbs): Windows-specific scripting
- Documentation: PDF and PowerPoint presentations
This project was developed for:
- Course: Network Security
- Program: Bachelor's Degree
- Date: December 2020
- Purpose: Hands-on malware analysis and cybersecurity education
This is an educational project. If you have suggestions for:
- Additional educational examples
- Improved documentation
- Better safety warnings
- Enhanced learning materials
Please feel free to contribute through issues or pull requests.
This project is for educational purposes only. Please use responsibly and in accordance with your institution's guidelines.
Remember: Knowledge is power, but with great power comes great responsibility. Use this knowledge to protect, not to harm.
Created for educational purposes in Network Security course - December 2020