All Projects → hasherezade → petya_key

hasherezade / petya_key

Licence: other
A decoder for Petya victim keys, using the Janus' masterkey.

Programming Languages

C++
36643 projects - #6 most used programming language
c
50402 projects - #5 most used programming language
CMake
9771 projects

Projects that are alternatives of or similar to petya key

Cry
Cross platform PoC ransomware written in Go
Stars: ✭ 179 (+411.43%)
Mutual labels:  ransomware
pyhtools
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (+374.29%)
Mutual labels:  ransomware
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+985.71%)
Mutual labels:  ransomware
Blackweb
Domains Blocklist for Squid-Cache
Stars: ✭ 189 (+440%)
Mutual labels:  ransomware
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+702.86%)
Mutual labels:  ransomware
file-less-ransomware-demo
Demonstrate about file-less malware approach using JavaScript
Stars: ✭ 46 (+31.43%)
Mutual labels:  ransomware
Malware
Rootkits | Backdoors | Sniffers | Virus | Ransomware | Steganography | Cryptography | Shellcodes | Webshells | Keylogger | Botnets | Worms | Other Network Tools
Stars: ✭ 156 (+345.71%)
Mutual labels:  ransomware
Ransomware-Reports
This repo is a collection of Ransomware reports from vendors, researchers, etc.
Stars: ✭ 90 (+157.14%)
Mutual labels:  ransomware
Ransom
Various codes related to Ransomware Developement
Stars: ✭ 119 (+240%)
Mutual labels:  ransomware
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+140%)
Mutual labels:  ransomware
Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+542.86%)
Mutual labels:  ransomware
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+2105.71%)
Mutual labels:  ransomware
simple-ransomware
Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!
Stars: ✭ 29 (-17.14%)
Mutual labels:  ransomware
Online Privacy Test Resource List
Privacy Online Test and Resource Compendium (POTARC) 🕵🏻
Stars: ✭ 185 (+428.57%)
Mutual labels:  ransomware
JavaRansomware
Simple Ransomware Tool in Pure Java
Stars: ✭ 99 (+182.86%)
Mutual labels:  ransomware
Cypher
Pythonic ransomware proof of concept.
Stars: ✭ 178 (+408.57%)
Mutual labels:  ransomware
Keep-It-Secure-File-Encryption
Keep It Secure Private Data Encryption & Decryption Tool
Stars: ✭ 38 (+8.57%)
Mutual labels:  ransomware
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (+5.71%)
Mutual labels:  ransomware
Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+174.29%)
Mutual labels:  ransomware
nemucod decrypt
Ruby tool to decrypt Nemucod ransomware
Stars: ✭ 21 (-40%)
Mutual labels:  ransomware

petya_key

A decoder for Petya victim keys, using the Janus' masterkey
It supports:

  • Red Petya
  • Green Petya (both versions) + Mischa
  • Goldeneye (bootlocker + files)

Read more about identifying Petya versions here

Download tools


DISCLAIMER: Those tools are provided as is and you are using them at your own risk. I am not responsible for any damage or lost data.


Usage:

./petya_key [victim_data]

where the [victim_data] is a file containing the 'personal decryption code' displayed by the bootlocker

  1. Save your "Personal decryption code" as a continuous string, without separators. Example of the valid file content:
e2NKAXKGX7YFYUHPUuwrcfZ6FUkkYtRUdvzqRUwacPgjMvyYr8mH5Pw4X8Wdt6XgLrK7G7m1TVVeBdVzRDayyHFWp76353A1
  1. Supply the saved file to the decoder:
./petya_key saved_id.txt

Choose your version of Petya from the menu. If the given data is valid, you will get your key, i.e:

[+] Your key   : TxgTCXnpUPSeR2U7
  1. Before unlocking attempt I strongly recommend you to make a dump of the full disk. Some versions of Petya are buggy. For example they may hang during decryption and corrupt your data.

In order to decrypt MFT, supply the generated key to the bootlocker.
In order to decrypt files you need supply the key to an appropriate decryption tool.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].