Skip to content

Ephrimgnanam/Worms

Repository files navigation

Welcome to my🪱Worms Repo, a collection of Worms gathered from public sources (like MalwareBazaar) for research, reverse engineering, and educational purposes.

   oo
   |"           ~~~ <---Not just code. It's a creeping, self-replicating ghost in your network.
   |
 --'

⚠️ Disclaimer

  • This repository is intended solely for ethical research and educational use. The samples provided here must not be used in any unauthorized or malicious activities.
  • The use of these samples in any way that violates the law or any platform’s Terms of Service is strictly forbidden.
  • By using or accessing this repository, you agree to use the contents responsibly, ethically and legally.
  • Do not use the information herein to deploy or spread malware.
  • The author(s) of this repo are not responsible for any misuse.
  • Always analyze malware in a safe, isolated environment (e.g., Air-Gapped VMs).
                           (o)(o)
                          /     \
                         /       |
                        /   \  * |
          ________     /    /\__/
  _      /        \   /    /
 / \    /  ____    \_/    /                     Hello Fellas i Won't die easily !! 
//\ \  /  /    \         /
V  \ \/  /      \       /
    \___/        \_____

📚 Purpose

This repository was created for:

  • Learning how Worms work internally for defensive programming.
  • Reverse-engineering and malware analysis practice.
  • Building better endpoint protection systems.
  • Teaching cybersecurity concepts in ethical hacking and digital forensics courses.

🔍 Attribution & Sources

Big thanks to:

  • 🐾 MalwareBazaar — for open malware sample access.
  • 🧠 VX-Underground — for inspiring open malware intelligence.
  • 🛠️ Community malware researchers, REs, and cybernerds who make the internet slightly less awful.

🧰 Included Worms(As of now I'm Lazy will do that in future)

Each Worms in this archive includes:

  • Source Code (if available).
  • Technical Overview(if available).
  • Indicators of Compromise (IoCs)(if available).
  • Behavior Analysis Summary(if available).

🔐 Stay Legal & Ethical

If you’re using this repo for training:

  • Always test in a controlled, isolated lab environment.
  • Do not deploy any samples.
  • Respect your local laws and international cybersecurity norms.

⭐️ Support The Repo

Star the repo if you find it useful. Pull requests and analysis contributions are always welcome.

                                   _,-------.
                                ,'          `.
                               ;              ;
                      ,-'"`-. ;,---._         ;
                     ;  ,-. ,'_      `.       ;
                     ;  ;_;;;' ;      ;      ;
                     `.    ;`-'       ;      ;
                       `-,''.        ,'     ;
                     _,-'    `-.__,-'      ;
              _,,-"""                     ;
              `.                         ;
               ;`.                      ;
               ;  `.                   ;
               ;.   `.       ;        ;
                ;     `.     ;       ;
                ;       `-.. ;      ;
                ;           ,'     ;
                ;                  ;
                 ;                ;
                 ;                ;
                 ;               ;
                  ; --.          ;
                  ; .___         ;
                   ;    '--..   ;
                   ; '--..      ;
                    ;_    '"    ;
                     ;""'-._    ;
                     ;-.._      ;
                     ;_   '""   ;
                     ; '- .     ;
                                                                           Tired of Conquering Shhhhh

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  

Languages