All Projects → ncorbuk → Python Ransomware

ncorbuk / Python Ransomware

Licence: mit
Python Ransomware Tutorial - YouTube tutorial explaining code + showcasing the ransomware with victim/target roles

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects

Projects that are alternatives of or similar to Python Ransomware

Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (+303.13%)
Mutual labels:  hacking, malware, ransomware
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+9255.21%)
Mutual labels:  hacking, malware
Holisticinfosec For Webdevelopers Fascicle0
📚 Overview 🔒 Tooling 🔒 Process 🔒 Physical 🔒 People 📚
Stars: ✭ 37 (-61.46%)
Mutual labels:  hacking, infosec
Dr0p1t Framework
A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks
Stars: ✭ 1,132 (+1079.17%)
Mutual labels:  hacking, malware
Spytrojan keylogger
[Solo para programadores] Troyano espía | Keylogger solo para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. | Envío de registro mediante [Base de Datos], [Gmail] o [BotTelegram].
Stars: ✭ 32 (-66.67%)
Mutual labels:  hacking, malware
Badusb botnet
👥😈 Infect a pc with badusb and establish a connection through telegram.
Stars: ✭ 32 (-66.67%)
Mutual labels:  hacking, infosec
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-35.42%)
Mutual labels:  hacking, infosec
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+707.29%)
Mutual labels:  hacking, infosec
Malware Feed
Bringing you the best of the worst files on the Internet.
Stars: ✭ 69 (-28.12%)
Mutual labels:  malware, infosec
Blackworm
Black Worm Offical Repo
Stars: ✭ 80 (-16.67%)
Mutual labels:  hacking, ransomware
Malice
VirusTotal Wanna Be - Now with 100% more Hipster
Stars: ✭ 1,253 (+1205.21%)
Mutual labels:  malware, infosec
Blocklistsaggregator
A Python tool that downloads IP block lists from various sources and builds configurations for network equipments and firewalls.
Stars: ✭ 20 (-79.17%)
Mutual labels:  malware, ransomware
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+806.25%)
Mutual labels:  hacking, infosec
Malcom
Malcom - Malware Communications Analyzer
Stars: ✭ 988 (+929.17%)
Mutual labels:  malware, infosec
Malware Samples
A collection of malware samples caught by several honeypots i manage
Stars: ✭ 863 (+798.96%)
Mutual labels:  malware, ransomware
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+1017.71%)
Mutual labels:  hacking, infosec
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+1220.83%)
Mutual labels:  hacking, infosec
Hblock
Improve your security and privacy by blocking ads, tracking and malware domains.
Stars: ✭ 724 (+654.17%)
Mutual labels:  malware, ransomware
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+655.21%)
Mutual labels:  hacking, malware
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+1083.33%)
Mutual labels:  hacking, infosec

Python-Ransomware

YouTube Tutorial: https://www.youtube.com/watch?v=ScL07VJJOX4

To test the Ransomware out on your machine,

  • edit lines 49 and 140 in the ransomware.py file with your own absolute paths etc for testing purposes and so you can use the localRoot folder

  • [ATTACKER] Run the RSA script to generate two keys, a private and public key

  • [TARGET] Run the ransomware script - localRoot .txt files will be encrypted now

  • [ATTACKER] Run the fernet key decryption file to decrypt the EMAIL_ME.txt(be on your desktop) file, this will give you a PUT_ME_ON_DESKtOP.txt file, once you put this on the desktop the ransomware will decrypt the localRoot files in that directory

... watch the tutoiral to understand the scripts better. I quickly go over the scripts lightly in first 5 mins, I then run through the scripts and showcase the ransomware working etc and act the roles of the attacker/target out and show you it working etc, I then go over the scripts in more detail afterwards.

Subscribe to channel for more videos.

If you would like to leave a tip you can do so below, thanks

Created with

Disclaimer

This tool is only for testing and academic purposes and can only be used where strict consent has been given. Do not use it for illegal purposes! It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this tool and software in general.

#Python#Ransomware#Malware

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].