Skip to content

grendizerh/netx

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Netx: Cool Worm

Netx is a self-replicating, low-observable malware framework designed for persistent lateral movement within Windows-based network architectures. Unlike static payloads, Netx is an active predator: it continuously monitors its environment, harvests credentials, and exploits trust relationships to compromise neighboring hosts.

By combining Tor anonymity with kernel-level process locking, it achieves a level of stability rarely seen in script-based worms. It does not just infect, it establishes a permanent, silent net using advanced scheduling bypasses that allow it to survive reboots and user logouts. It also uses tor networking to bypass SSH max auth blacklist, and to avoid tracing back to your IP since we use a listener that receives the looted info such as usernames and passwords for SSH

☣️ Infection Vectors

1. Network Propagation (SSH)

The worm identifies the local gateway and performs a Class C subnet scan (/24) for open Port 22. It utilizes a bundled wordlist to perform high-speed, proxied bruteforce attacks. Upon a successful breach:

It infects C:/Users/Administrator/AppData/Roaming/Microsoft/Windows/Start Menu/Programs/Startup/.

It bypasses UAC folder restrictions by registering a Scheduled Task for persistence.

2. Physical Propagation (USB)

Every 300 seconds, the worm monitors psutil.disk_partitions for newly mounted removable drives. It automatically clones itself as system_service.exe to the root of the drive(thanks to SSH), running immediately.

⚠️ Operation Warnings

Lateral Loops: The Mutex is critical. Without it, the worm will attempt to infect itself repeatedly across the network, leading to a crash.

Network Noise: nmap scans are noisy. On a corporate network, this will likely trigger an IDS (Intrusion Detection System) alert.

📦 Compilation & Deployment

To ensure maximum compatibility and stealth, the script must be obfuscated and bundled into a standalone binary.

cd netx
./go.sh
python3 listener.py

NOTE

DO NOT TERMINATE THE WINDOW WHERE YOU RAN go.sh! THE .onion IS RUNNING THERE AND YOU WILL NOT BE ABLE TO RECEIVE THE DATA FROM THE WORM IF TERMINATED.

To make this work, the inception target must open the .exe file only if it's spread by email or USB, but when spreading by network it runs automatically. Using email is the best option since the target opens the file directly.

⚠️ Requirements

Platform: Windows 10/11 (Target)

Compiler: Python 3.10+

Dependencies: paramiko, python-nmap, psutil, netifaces, stem, pysocks.

HELP WANTED

If you would like to contribute send me a message

🛑 Disclaimer

This software is developed for educational and authorized security auditing purposes only. The author is not responsible and does not contribute to whatever you do with it.

About

Most powerful worm on GitHub

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published