OMVCK (Odysseus Macro Virus Construction Kit)
Written by Dark Shadow, this kit produces macro virus source codes for Microsoft Word for Windows 6. The tool was designed so that individuals who do not possess programming skills can still create a computer virus.
SSIWG (Senna Spy Internet Worm Generator)
This virus generation package creates VBS script files. These files have features that are worm-like and are normally distributed via email. Usually a message with an alluring subject or message is sent out with the goal of enticing the recipient to open the VBS file which activates the worm.

NEG (NoMercy Excel Generator)
NEG was the world’s first virus construction kit specifically designed to create Excel macro viruses. Authored by the same person who created Crazybits Virus Construction Kit, NEG features several payloads and creates .BAS source files.
VBSWG (VBS Worm Generator)
This virus generation requires the Microsoft Vb5 runtimes and Windows Scripting Host 5.0. It creates a worm that is added to the html code of an email message. When the message is viewed, the system is infected. The worm searches for hard drives and network drives to perform its designated task.
AMG (Access Macro Generator)
This virus generation kit produces viruses that affect Microsoft Access 97. The package will only work if the file msvbvm50.dll is installed. It features a standard Windows user interface and has options to kill files or dlls or to specifically target the folder C:/Program Files.
DREG (Digital Hackers’ Alliance Randomized)
DREG creates virus source codes and compiles them as executable files. It generates non-memory resident encrypted COM viruses. It employs anti-heuristic tricks and uses several code variants and junk instruction sequences. The package is somewhat buggy and consequently creates buggy viruses.
Do Virus Authors use these Tools or do they Create their Own?
As in any kind of endeavor, there are professionals and there are dabblers. Many virus authors are dabblers, perhaps just “scratching an itch,” fulfilling their own curiosity about how to create an email virus or similar malicious code. Some computer users, for reasons many of us cannot fathom, don’t feel they’ve done all there is to do until they’ve had the “create your own virus” experience. These are the kind of people who tend to download and experiment with virus creation tools. Truly destructive viruses that can elude detection measures and deliver successful payloads are almost always the work of skilled programmers who take great pride in the originality of their creations.

Part of understanding this annoying and destructive brand of computer vandalism is to understand to some degree the “how to create a computer virus” aspect of the equation. The more that is known about how virus authors actually make computer viruses or create computer virus, the better the computer-using community will be at stopping them.