RedNeuron is a Framework Creator of Malware, this framework it's focused in attacking Windows Machines but are created to execute the creator framework in Linux, you can use it in any Linux distribution you only need the necessary requeriments.
If you want to collaborate with code or ideas you can contact me in s12deff@gmail.com.
If you want to help the development of this tool with money, you can buy one suscription in Medium: https://medium.com/@s12deff/membership
It's developed in Kali Linux machine, and tested in Kali, Athena OS, Ubuntu and Parrot OS.
Actually in Version 1.6, the uniques 6 malwares options to create is a Undetectable Reverse Shell to bypass Windows Defender, and Persitence file using Run Register, also you have a ProcList tool to list all processes, also exists a FindWindow Tool that tool inject a reverse shell into a remote process via process Window Name, a MySQL Data Stealer using Triggers and C2 Server ,latest tool inside RedNeuron its File Extractor, this tool are developed mainly with 3 languages:
- C++
- Python
- Bash
This tool have a shell to use and move inside RedNeuron, in this moment only have three sections
- Main
- Create
- PostExploitation
Future Malware tools:
- C2 Server
- KeyLogger
- Ransomware
Clone this repository:
git clone https://github.com/S12cybersecurity/RedNeuron
Install requeriments:
apt update && apt install python2 && apt install g++-mingw-w64
If you don't have Metasploit you need to install.
Guide: https://adamtheautomator.com/install-metasploit-on-ubuntu/
Set RedNeuron as executable
chmod +x RedNeuron
Python2 requeriments
wget https://bootstrap.pypa.io/pip/2.7/get-pip.py
python2 get-pip.py
pip2 install pycryptodome
Compile
The code it's compiled, but if you want to compile run this command:
gcc redneuron.cpp -lstdc++ -Wwrite-strings -o RedNeuron
Execute ./RedNeuron
If you want to create malware, you execute create command:
With list command you can see all available malware:
Create Undetectable Windows Reverse Shell:
Create Windows Persistence File:
Create ProcList EXE:
Now execute in Victim machine!
WindowInjector
Run WindowInjector command:
And Now Execute in Victim machine:
And get the reverse shell:
File Extractor
First enter to postexplotation shell:
Then execute file-extractor command:
Now you have in your directory the exe to execute in windows machine to transfer a file to RedNeuron.
You only need to provide the information. And its listening:
And in Windows Machine execute it:
And here you have your transfered file
MySQL Data Stealer:
First of all, this tool its post-exploitation, to enter it we need to execute postexploitation command:
And now execute mysql-stealer:
To use it you can check this Medium Post about it!
https://medium.com/@s12deff/mysql-data-stealer-hacking-mysql-26b960bb7d10