Skip to main content

Author’s Note

The following message is from David Timber, the creator of the Proone Worm Project.
In a nutshell, this project is a reengineered version of Mirai, but in a serious tone and with some extras. Inspired by the work of original authors of Mirai, I started this project on the new year’s eve of 2020. I don’t mean any harm to this world. This is merely one of my “art projects” and I hope it will stay that way.

The Name: Proone

I named this project “Proone” because the first idea as to what to do with this worm was “pruning” bad devices off this big tree called the Internet.

What Are “Bad Devices”?

The bad devices I refer to here are:

Neglected Devices

Obsolete devices running unpatched software that have been abandoned by manufacturers or users

Poorly Designed Devices

Devices with built-in security vulnerabilities like predictable default logins and unlocked maintenance backdoors
Especially, these vulnerable devices running on a network without a firewall fall victim to being botnets for nefarious purposes.

The Original Idea

My original idea was a “search and destroy” operation against these devices for a good cause. The concept was to identify and eliminate these vulnerable devices to prevent them from being exploited by malicious actors.

Why It Was Abandoned

During the development, I came to realise that this is a bad idea and that I lack the balls to pull this off. Therefore I hereby abandon the idea by publishing my work online.
The decision to abandon operational deployment and instead publish the work demonstrates ethical consideration and responsible disclosure of security research.

Reflections on the Project

Call this whatever you want:
  • Reinventing the wheel
  • Copycat
  • Waste of time
Whatever you want to call it, working on this project helped me a lot.

What This Project Represents

Understanding low-level systems programming, network protocols, embedded systems, and malware architecture provided invaluable hands-on experience.
Exploring how IoT vulnerabilities work in practice and understanding the mechanisms behind modern botnets contributes to defensive security knowledge.
Grappling with the ethical implications of powerful security tools and making the decision to publish rather than deploy demonstrates maturity in handling dual-use research.
Viewing security research as an “art project” - a creative exploration of technical possibilities and boundaries within a theoretical framework.

A Personal Journey

This project represents a personal journey of exploration and learning. It demonstrates:
  1. Technical Capability: The ability to design and implement complex distributed systems
  2. Critical Thinking: Recognizing when an idea should remain theoretical
  3. Responsibility: Choosing to share knowledge rather than weaponize it
  4. Growth: Learning from the process itself, regardless of deployment

Understanding Context

Proone was conceived in late 2019/early 2020, during a period when IoT security vulnerabilities were increasingly exploited for large-scale DDoS attacks. The Mirai botnet (2016) had demonstrated the vulnerability of the IoT ecosystem, and this project represents an attempt to understand and document these vulnerabilities in depth.

Moving Forward

By publishing this work, the knowledge becomes available for:
  • Security Researchers: Understanding modern worm architecture and IoT exploitation techniques
  • Device Manufacturers: Recognizing vulnerabilities in their products
  • Network Administrators: Learning about threats to protect against
  • Students: Studying real-world malware design for educational purposes
This software must only be used in controlled, isolated environments. See the Security Notice for critical warnings about legal and ethical considerations.

Academic Context

For those interested in the broader context of IoT security and botnet research, the original README references these academic resources:

Legal Analysis

Academic paper on legal aspects of IoT security and botnets

Technical Thesis

University of Oslo thesis on related security research

Final Note from the Author: This project exists as a testament to what can be learned through deep technical exploration, and as a reminder that with technical capability comes responsibility. The decision to publish rather than deploy is intentional and deliberate.
Copyright (c) 2019-2022 David Timber <[email protected]> Proone Worm Project - Started New Year’s Eve 2020

Build docs developers (and LLMs) love