This project is created only for educational and research purposes.
It demonstrates how malware might behave, to help students and security researchers understand:
- Windows registry persistence
- Keylogging techniques
- Data exfiltration mechanisms
- Multi-threaded execution
Do not use this project for malicious purposes.
Running such software outside a controlled lab environment can be illegal.
On Windows, the program simulates typical behaviors of a trojan:
- Registers itself in Windows startup (persistence simulation).
- Reads browser databases (Google, Edge) and stores locally.
- Starts a keylogger (demo).
- Periodically "exfiltrates" data (here: to an email).
- Takes screenshots and manages them in a loop.
- Runs in multiple threads (simultaneous processes).
- Security students can analyze how trojans hide and persist.
- Researchers can test detection techniques in antiviruses.
- Developers can understand multi-threaded system-level programming.
In the __send_file__ function, replace placeholders with test credentials (e.g., a throwaway Gmail account with an app password):
msg['From'] = 'your_test_email'
msg['To'] = 'your_test_email'
server.login('your_test_email', 'password_app')