Skip to content

winsecurity/MaleficentVM

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 

Repository files navigation

MaleficentVM

This is practice VM for malware development.

What is this VM?

This VM provides practice challenges for malware development just like ctf challenges. VM also comes with .NET framework installed incase if you want to use c# for malware development.

Downloading the VM

  • Use the link here to download the VM, it's around 21gb in size
  • Use this Onedrive link here incase the google drive link does not work

Setup

  • Download the .ova file
  • Open it with virtual box or vmware workstation
  • Give the VM a name and power on the machine
  • Set network adapter settings to bridged so we can scan for ip address using nmap
  • Use nmap or any other ip scanner tools to scan the ip address of the VM, eg: nmap -sn ourkaliip/24 to retrieve all other active hosts on our network
  • Go to your browser and open http://IP_ADDRESS_OF_VM:5000
  • You can see the challenges, write the code in c/c++/rust/c# or any other language and upload the binary to get the flag
  • Take a snapshot of the VM so that you can revert back to the original state if anything error happens

Running the server manually

  • If the server does not run automatically, login to the vm and run these commands from cmd as administrator
cd "C:\Users\flash\Desktop\myserver\myserver"
python main.py

Sample Challenges

image image image image

VM users' password

Credentials for the users are flash:flash and arrow:arrow

About

This is practice VM for malware development

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published