Something I've been playing around with,
https://github.com/pythogen/Python/tree/master/Projects/pyCrawlThe crawl method searches the drive for file formats specified in the code in order to concatenate code or general data.
The driveScan method is designed to scan accessible drives A: to Z: for external device infection using the autorun exploit.
DriveScan loops until a new drive is found to be a accessible dir (when the device is inserted via usb) and copies itself as an exe (file execution directory / compiled with py2exe) to the located drive for infection. It also creates or overwrites autorun.ini for execution on vulnerable operating systems (Window XP and Vista) then finally hides both the newly copied executable and the ini file ending the infection process.
The process is continuous. The script's main priority is to scan for drives and distribute itself.
file extraction may be useful for injecting code into html files or rewriting python and ruby files.
Just something I wrote for fun and wanted to share. It's perhaps a foundation to some sort of malware due to the fact the only purpose is self-distribution..