Giter VIP home page Giter VIP logo

android-ransomware-proof-of-concept's Introduction

Ransomware Proof of Concept

This repository houses an educational ransomware proof of concept designed for research and educational purposes. This project provides insights into how ransomware operates using Termux application only.

Features

  1. AES Encryption: The script uses AES-256 algorithm to encrypt files.

  2. File Deletion: Empty and original files are removed during encryption.

  3. File Processing: It processes files in specified directories, encrypting or decrypting them.

How It Works

This code operates as follows:

  1. AES Key Generation: Randomly generates an AES encryption key for file encryption.

  2. Server Configuration: Connects to a server, configuring the IP and port settings within the script to obtain the decryption key.

  3. Thumbnail Folder Removal: Automatically deletes the thumbnail folder and its contents to prevent accidentally encrypting large files.

  4. Effective File Management: Scans specified directories like "Download" and "Pictures" to precisely identify files for encryption or decryption processes.

  5. File Recovery: After encryption, presents a ransom message. To recover files, you'll need to provide the correct decryption key.

Setting Up Ransomware

NOTE: Please adhere to ethical and legal guidelines when experimenting with this code, as it can have serious consequences if used for malicious or unlawful purposes.

Step 1: Install Termux

Install Termux on your Android device from the Google Play Store.

Step 2: Open Termux

Launch the Termux app on your Android device and run the following commands:

pkg update
pkg upgrade
pkg install python
pkg install python-pip
pip install pycryptodome

Step 3: Install Git

Install Git, which will allow you to clone repositories from GitHub:

pkg install git
git clone https://github.com/TechSavvyTaco/Android-Termux-Ransomware-Proof-of-Concept/

Step 4: Configure the Server

Run the following command:

cd Android-Termux-Ransomware-Proof-of-Concept
python server.py

Step 5: Execute the Script

Create another session and run the script:

cd Android-Termux-Ransomware-Proof-of-Concept
python ransomware.py

Step 6: Access the Key

To obtain the key, navigate to the initial session where "server.py" is currently active, and copy your key.

Remember

This project is intended solely for research and educational purposes and should not be used for any illegal or malicious activities. Please exercise caution to avoid accidental data loss during testing. Be sure to maintain proper backups of your important data.

Screenshots

Termux Screenshot 1 Termux Screenshot 2

Server Screenshot

Storage Screenshot 1 Storage Screenshot 2

android-ransomware-proof-of-concept's People

Contributors

techsavvytaco avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.