Skip to content

thinking-mindy/leech

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Leech - Educational Malware Simulation

⚠️ SAFETY WARNING: This is an EDUCATIONAL tool for testing antimalware software. All operations are SAFELY LIMITED to a test directory and have built-in safety limits.

Purpose

This is a safe, educational malware simulation designed for:

  • Testing antimalware/antivirus software
  • Cybersecurity education and research
  • Understanding malware behavior patterns in a controlled environment

Safety Features

Isolated Test Environment: All operations are limited to ./test_worm_sandbox/ directory ✅ Memory Limits: Maximum 1GB memory usage ✅ File Limits: Maximum 1000 test files ✅ Thread Limits: Maximum 50 concurrent threads ✅ Iteration Limits: Maximum 10,000 iterations per pattern ✅ No System File Access: Never touches system files or directories ✅ No Network Calls: Network activity is simulated only (no actual connections)

Simulated Behaviors

This tool simulates various malware patterns for antimalware testing:

  1. Memory Hogging: Simulates excessive memory allocation (limited to 1GB)
  2. RAM Consumption: Simulates high RAM usage patterns
  3. File Flooding: Creates multiple test files in isolated directory
  4. Process Spawning: Simulates process creation patterns
  5. Network Activity: Simulates network connections (no actual network calls)
  6. Filesystem Scanning: Scans only the test directory

Usage

# Build the project
cargo build --release

# Run the simulation
cargo run --release

Important Notes

  • ONLY FOR TESTING: Use only in isolated environments (VMs, containers, test machines)
  • NO REAL DAMAGE: All operations are contained and limited
  • EDUCATIONAL USE: Designed for cybersecurity education and antimalware testing
  • CLEANUP: Test files are created in ./test_worm_sandbox/ and can be safely deleted

Safety Guarantees

  • ✅ Never deletes system files
  • ✅ Never modifies files outside test directory
  • ✅ Never makes actual network connections
  • ✅ Never spawns real system processes
  • ✅ All operations have hard limits
  • ✅ Can be safely stopped at any time

For Antimalware Testing

This tool is designed to trigger antimalware detection by:

  • Creating suspicious file patterns
  • Simulating memory-intensive operations
  • Generating network-like activity logs
  • Creating multiple processes/threads
  • Scanning filesystem patterns

Your antimalware software should detect these patterns as suspicious behavior.

Cleanup

To remove all test files:

rm -rf ./test_worm_sandbox/

License

Educational use only. Use responsibly and only in isolated test environments.

About

An aggressive worm to destroy any system without remorse.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors