All Projects → Bitwise-01 → Thor

Bitwise-01 / Thor

Licence: other
A Simple Ransomware

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Thor

Osweep
Don't Just Search OSINT. Sweep It.
Stars: ✭ 225 (+508.11%)
Mutual labels:  ransomware
simple-ransomware
Simple ransomware to troll your friends. Encrypt and Decrypt a Windows computer using a simple xor encryption which is pretty basic!
Stars: ✭ 29 (-21.62%)
Mutual labels:  ransomware
Ransomware-Reports
This repo is a collection of Ransomware reports from vendors, researchers, etc.
Stars: ✭ 90 (+143.24%)
Mutual labels:  ransomware
conti-pentester-guide-leak
Leaked pentesting manuals given to Conti ransomware crooks
Stars: ✭ 772 (+1986.49%)
Mutual labels:  ransomware
Keep-It-Secure-File-Encryption
Keep It Secure Private Data Encryption & Decryption Tool
Stars: ✭ 38 (+2.7%)
Mutual labels:  ransomware
Jasmin-Ransomware
Jasmin Ransomware is an advanced red team tool (WannaCry Clone) used for simulating real ransomware attacks. Jasmin helps security researchers to overcome the risk of external attacks.
Stars: ✭ 84 (+127.03%)
Mutual labels:  ransomware
Online Privacy Test Resource List
Privacy Online Test and Resource Compendium (POTARC) 🕵🏻
Stars: ✭ 185 (+400%)
Mutual labels:  ransomware
goMS17-010
Simple program for detecting if host(s) are vulnerable to SMB exploit(MS17-010)
Stars: ✭ 67 (+81.08%)
Mutual labels:  ransomware
file-less-ransomware-demo
Demonstrate about file-less malware approach using JavaScript
Stars: ✭ 46 (+24.32%)
Mutual labels:  ransomware
Phirautee
A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using PowerShell and does not require any third-party libraries. This tool steals the information, holds an organisation’s data to hostage for payments or permanently encrypts/deletes the organisation data.
Stars: ✭ 96 (+159.46%)
Mutual labels:  ransomware
Owlyshield
Owlyshield is an EDR framework designed to safeguard vulnerable applications from potential exploitation (C&C, exfiltration and impact))..
Stars: ✭ 281 (+659.46%)
Mutual labels:  ransomware
pyhtools
A Python Hacking Library consisting of network scanner, arp spoofer and detector, dns spoofer, code injector, packet sniffer, network jammer, email sender, downloader, wireless password harvester credential harvester, keylogger, download&execute, ransomware, data harvestors, etc.
Stars: ✭ 166 (+348.65%)
Mutual labels:  ransomware
The-MALWARE-Repo
A repository full of malware samples.
Stars: ✭ 380 (+927.03%)
Mutual labels:  ransomware
Umbra
A LKM rootkit targeting 4.x and 5.x kernel versions which opens a backdoor that can spawn a reverse shell to a remote host, launch malware and more.
Stars: ✭ 98 (+164.86%)
Mutual labels:  ransomware
MalwareDatabase
One of the few malware collection
Stars: ✭ 37 (+0%)
Mutual labels:  ransomware
Blackweb
Domains Blocklist for Squid-Cache
Stars: ✭ 189 (+410.81%)
Mutual labels:  ransomware
nemucod decrypt
Ruby tool to decrypt Nemucod ransomware
Stars: ✭ 21 (-43.24%)
Mutual labels:  ransomware
Horus-Eye
Just Simple Code To Play With Android Payloads (;
Stars: ✭ 54 (+45.95%)
Mutual labels:  ransomware
petya key
A decoder for Petya victim keys, using the Janus' masterkey.
Stars: ✭ 35 (-5.41%)
Mutual labels:  ransomware
JavaRansomware
Simple Ransomware Tool in Pure Java
Stars: ✭ 99 (+167.57%)
Mutual labels:  ransomware

Thor

Thor is a ransomware.
It uses RSA-2048 with AES-128 to encrypt files.

For educational purposes

This software is STRICTLY for educational purposes.

How to stay safe while playing with this code?

DO NOT uncomment the lines within payload/agent/lib/file_finder.py By default, it will only encrypt files within a folder in your desktop named Target_Folder
Warning: Do not run this code on your PC, use a VM instead. And If you do run it, let it run all the way.

Notice:

I will not be responsible for your actions. DO NOT touch this code if you lack self-control.

For your protection

For your own protection this ransomware will only encrypt files within a folder named Target_Folder within your desktop. You can tell it lock all files by uncommenting a few lines within payload/agent/lib/file_finder.py

Requirements

  • Python 3.6.x | 3.7.x

Usage with a VM

  1. Uncomment the commented out section of payload/agent/lib/file_finder.py

  2. Generate server's public key pair python thor.py

  3. Change directory into payload directory

  4. Run the encryptor_generator.py

  5. Infect your VM with the exe

  6. Get the encrypted RSA private key that the exe outputs from your VM

  7. Change directory back into payload directory

  8. Run the decryptor_generator.py and give it the RSA keys

  9. Send the decryptor.exe to the VM

  10. Let the decryptor run and decrypt the files within your VM

No sharing

Each time you generate an ransomware, you must generate a decryptor for that ransomware. You cannot generate one decryptor and use it with differently generated ransomware.

Example usage

  1. Install requirements
    pip install -r requirements.txt
    
  2. Generate server's public key pair
    python thor.py
    
  3. Change directory into payload & generate a ransomware
    python encryptor_generator.py -b mybtcadress -a 120 -k ../server/keys/public.pem -n virus_danger
    
  4. Change directory into payload & generate a decryptor
    python decryptor_generator.py -sk ../server/keys/private.key -vk encrypted_private.ekey -n decryptor
    

Disclaimer

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR

IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,

FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE

AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER

LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,

OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE

SOFTWARE. THIS SOFTWARE IS PURELY FOR EDUCATIONAL PURPOSES.
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].