Retro VM+ is a cross-platform Rust and Python-powered cybersecurity simulator that blends gamification with real-world ethical hacking tools. Designed to teach, test, and entertain, the app includes hidden features, retro-style terminals, virtualization, ML-based network analysis, and embedded games โ all geared toward providing practical cybersecurity exposure.
https://www.youtube.com/watch?v=beIokbakJOA
-
Normal Mode:
- UI mimics a booted system.
- Prompts password entry. If incorrect (not "Hola Amigos!"):
- Spawns fake virus attack by opening multiple notepad processes.
- Simulates malware behavior.
- Must type
stopto terminate the attack.
-
Ghost Mode:
- Shows ghost animation.
- Press
Shift + Dto launch Kali Linux VM using QEMU and a virtual disk (.isoand.qcow2). - Provides a virtual penetration testing environment.
- Achieved by:
- Playing Vedic Math Game
- Scoring above 2048
- Pressing
Ctrl + Hโ Black screen mode - Then press
Ctrl + Alt + Gโ Opens terminal interface
| Command | Description |
|---|---|
phishgen |
Generates phishing page via warp, tunnels through Ngrok, logs captured credentials. |
footscan |
Simulates OSINT-based digital footprint scanning. |
netscan |
Scans Wi-Fi interfaces and browser extensions; uses ML to identify threats. |
๐ Terminal Modules & Commands Command Description phishgen Phishing Website Generator: Generates a fake login page using HTML templates in Rust. Tunnels it online using Ngrok, logs credentials in real-time. netscan AI-Powered Network Scanner: Uses Python + trained ML model (via scikit-learn + xgboost) and NLP techniques with nltk to scan for:
Risky Wi-Fi names (SSID fingerprinting)
Suspicious browser extensions (parsed using BeautifulSoup)
Detects potential keylogging patterns and trackers via page content scraping | | footscan | Digital Footprint Scanner: Uses OSINT and metadata extraction to simulate how attackers might gather passive data about you online. | | vault | Password Hash Vault: Accepts input, hashes it with SHA-256 using Rustโs crypto lib. Decryption only simulated via input match. | | ngoltek | Combines Ngrok with simulated attacker endpoint logic. Shows users how malicious tunnels can be used for C2 (Command and Control). |
๐ง Under the Hood (Tech Used) โ Rust for the terminal engine (tui), fake site host (warp), and secure modules
โ Python for ML/NLP backend:
nltk for tokenizing Wi-Fi SSIDs / extension names
BeautifulSoup for browser extension parsing
sentence-transformers to semantically understand extension descriptions
Pre-trained model classifies risk levels (e.g., โTrackerโ, โSuspicious Ad Injectorโ)
-
SHA-256 Notepad
- Write text, encrypt using SHA-256.
- Simulates secure password storage.
- Decryption (verification) only possible within this notepad interface.
-
Chess Game
- Functional gameplay.
- Hidden "Save Game" button opens embedded cybersecurity lessons:
- Linux commands
- OWASP Top 10
- CTF steps and payload tips
-
Floppy Disk Game
- Encrypts an image with secret text.
- Only upon winning is it saved.
- If user fails, image + message is deleted, simulating data loss.
-
1996-Themed Chatbot
- Powered by Ollama LLM
- Offers insights on ethical hacking, cybersecurity practices, and fun facts.
tokioโ async runtimewarpโ lightweight HTTP servertuiโ terminal-based UIsha2โ hashing algorithmstd::processโ QEMU execution, fake virus, notepad spawningserde,reqwestโ API requests and configs (e.g., Ngrok tunnel info)
Used for ML-based scanning and chatbot backend:
Flask,beautifulsoup4,requests,sentence-transformersscikit-learn,xgboost,nltk,transformers,torch,matplotlib
| Tool | Required For |
|---|---|
| Rust | Core app, QEMU launcher |
| Python 3.10+ | ML, chatbot, API calls |
| QEMU | Booting Kali Linux VM |
| Ngrok | Phishing site tunneling |
| Kali ISO | Virtual hacking system |
project/
โโโ assets/
โ โโโ kali-linux.isoโ
โ โโโ kali-qcow2
โ โโโ qemu/
โ โโโ qemu-system-x86_64(.exe)
โโโ src/
โ โโโ main.rs
โ โโโ modes
โ โโโ models
โ โโโ servers
โโโ requirements.txt
โโโ Cargo.toml
โโโ README.txt
| Concept | Implemented In |
|---|---|
| Virtualization | Kali Linux boot via QEMU |
| Red Team Tactics | Phishing site, fake malware |
| Hashing | SHA-256 Notepad encryption |
| Data Loss Simulation | Floppy Game (delete-on-fail) |
| OSINT Footprint | footscan module |
| Risk Detection | Network & extension scanner with ML |
| LLM & Security Chat | Ollama chatbot |
Retro VM is a gamified cybersecurity simulation app built with Rust and Python. Follow the steps below to install, configure, and run it on your system.
- OS: Windows 10+, macOS 10.15+, or Linux (Ubuntu 18.04+)
- RAM: 8 GB minimum (16 GB recommended)
- Storage: 5 GB+ free
- CPU: Multi-core (4+ cores, virtualization supported)
- GPU: DirectX 11 or OpenGL 3.3+ compatible
- Tools Required:
- Git
- Python 3.8+
- Rust (via rustup)
- QEMU
- Ngrok
-
CLONE THE PROJECT FROM GITHUB $ git clone https://github.com/Cyberpunk-San/osdc.git $ cd osdc
-
INSTALL PYTHON DEPENDENCIES $ pip install -r requirements.txt
-
INSTALL RUST (IF NOT INSTALLED) $ curl --proto '=https' --tlsv1.2 -sSf https://sh.rustup.rs | sh $ rustup update $ cargo --version
-
DOWNLOAD KALI LINUX ISO
- Go to https://www.kali.org/get-kali/
- Download "Kali Linux 64-bit Installer (ISO)"
- Place it in: /assets/kali-linux.iso
-
SETUP QEMU
- Download QEMU for your OS:
- Windows: https://qemu.weilnetz.de/w64/
- macOS:
brew install qemu - Linux:
sudo apt install qemu qemu-kvm
- Create a directory: /assets/qemu/
- Place the QEMU binary in that folder: Example: /assets/qemu/qemu-system-x86_64
- Download QEMU for your OS:
-
INSTALL OLLAMA (FOR CHATBOT) Download Ollama from: https://ollama.com
Follow installation steps for your OS.
After installation, run:
ollama run mistral
Ensure Ollama is running before starting Retro VM.
-
CREATE QCOW2 VIRTUAL DISK $ qemu-img create -f qcow2 assets/kali-linux.qcow2 30G
-
BUILD THE PROJECT $ cargo build --release
-
RUN RETRO VM $ cargo run
-
To run in release mode (faster): $ cargo run --release
-
To rebuild: $ cargo clean $ cargo build
Retro VM is packed with hidden cybersecurity tools and gamified challenges. Below is a complete list of hidden features, how to unlock them, and what each one teaches.
- ๐ฅ Ghost Mode (From Main Menu)
- Description: Switches interface to stealth mode with animated ghost visuals.
- Activation: Select โGhost Modeโ on the home screen.
- Purpose: Enables access to advanced tools including the VM launcher.
- ๐ฅ๏ธ Kali Linux Virtual Machine
- Description: Launches Kali Linux using QEMU in a sandboxed virtual environment.
- Activation:
Inside Ghost Mode โ Press
Shift + D - Requirements:
/assets/kali-linux.isoand akali-linux.qcow2file. - Purpose: Safe and isolated environment to practice ethical hacking techniques.
- ๐ง Fake Virus Simulator
- Description: A security prank that mimics a malware outbreak.
- Trigger:
Enter any password except
hola amigos!in Normal Mode login. - Effect: Spawns multiple Notepad windows simulating a virus.
- Exit:
Type
stopon the main screen to terminate.
- ๐ SHA-256 Notepad
- Description: Secure notepad that hashes user text using SHA-256.
- Features:
- Hashing and internal decryption.
- Decryption only allowed inside the app.
- Purpose: Teaches irreversible hashing and secure data entry.
- ๐ค 1996-Style Chatbot (Ollama)
- Description: Retro terminal-based chatbot built with Ollama + Transformers.
- Theme: Classic terminal UI mimicking late-90s shell interactions.
- Use Case: Acts as a retro-styled AI mentor for cybersecurity and math logic.
- ๐งฎ Vedic Math Game โ Unlock Hacker Terminal
- Description: Math challenge with a reward system.
- Activation Path:
- Score โฅ 2048 โ Press
Ctrl + Hโ screen darkens. - Then press
Ctrl + Alt + Gโ Hacker Terminal opens.
- Score โฅ 2048 โ Press
- ๐ฅ๏ธ Hacker Terminal (Rust-powered CLI)
- Description: Advanced command-line tools for simulated ethical hacking.
- Key Commands:
phishgenโ Generates phishing sites + tunnels via Ngrok.netscanโ Network scanner using NLP (NLTK) and XGBoost model.footscanโ Digital footprint + metadata scanner.vaultโ Password manager with SHA-256 encryption.ngoltekโ Simulates attacker tunnel behavior using Ngrok logic.
- Purpose: Learn red teaming, scanning, phishing, and footprinting.
- โ๏ธ Cyber Chess (with Hacking Module)
- Description: Classic chess interface with an integrated cybersecurity knowledge drop.
- Hidden Feature: Clicking the "Save" button opens an interactive learning module on ethical hacking topics.
- Purpose: Gamifies security awareness while testing logic skills.
- ๐พ Floppy Disk Game (Steganography Challenge)
- Description: A mini-game teaching steganography through play.
- Objective: Navigate and reach the goal to securely embed hidden text into an image.
- If You Win: โ Image is encrypted using steganography (text is embedded inside).
- If You Lose: โ The image is saved in raw binary format and the secret text is NOT recoverable.
- Purpose: Demonstrates real-world risks of improper encryption and hidden data manipulation.
๐ก Tip: Every layer of Retro VM is designed like a real-world capture-the-flag (CTF) environment. Exploration = education.
- For bugs: Submit a GitHub issue with logs and steps to reproduce
- For feature suggestions: Open a discussion or enhancement proposal
- For development: Follow code style, test thoroughly, and document your changes
Enjoy Retro VM โ your gamified, retro-infused ethical hacking simulator!