Crates.io | Malware_Rhapsody |
lib.rs | Malware_Rhapsody |
version | 0.0.2 |
source | src |
created_at | 2024-06-05 21:25:33.666331 |
updated_at | 2024-06-07 14:16:33.740747 |
description | Small researching of Linux's security for fun and education.. don't be silly to use it in wild. Have a great day, Dear Researcher/Scholar 💯❤️ |
homepage | |
repository | https://github.com/SarK0Y/Malware_Rhapsody |
max_upload_size | |
id | 1263155 |
size | 21,283 |
Research Linux's security for fun and education.
fish> cargo run -- -simplest-trap-fish
Now try run sudo..
fish> sudo echo "uttermost security"
You'll get..
[sudo] password for root:
Yeah, You're absolutely right ==>> Something has got utterly wrong.. if You enter Your password - You'll see that..
hey-ho, Dear Researcher, i am.. root
So, root gets hijacked from this point with very dumb trick. :)
bash> sudo mkdir /dev/shm/delIT
bash> cargo run -- -humble-user-del-root-stuff -num-thr >> Number of threads <<
+++
the more threads the better. But Rust's runtime prevents too many ones. So, workaround is to run parallel instances of Malware Rhapsody. Actually, there can be three outcomes..
Root-owned folder will be deleted.
Hardware will be damaged with extreme overheating.
Both.
UNDERCLOCKING.. then other sub-methods become useful.
KILL processes w/ too much Power consumption ==>> rather useful too.
This threat is major for any operating system, because it attacks hardware per se. Electrically unstable readings make possible to suppress security tokens/descriptors.
TELEGRAM: https://t.me/+N_TdOq7Ui2ZiOTM6 (Alg0Z).
ALG0Z RU: https://dzen.ru/alg0z
ALG0Z EN: https://alg0z.blogspot.com
E-MAIL: sark0y@protonmail.com
MalR https://github.com/SarK0Y/Malware_Rhapsody
YouTube: https://www.youtube.com/@evgeneyknyazhev968
Twitter_X: https://x.com/SarK0Y8
Donations: https://boosty.to/alg0z/donate