Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
strmrider authored Nov 26, 2021
1 parent 003172c commit bbce2e5
Showing 1 changed file with 9 additions and 9 deletions.
18 changes: 9 additions & 9 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,16 +3,16 @@ Simple and effective ransomware application

## Features
* Strong AES Encryption
* Safe server-paylaod communication
* Safe server-payload communication
* Payload's data tracking and restoration options
* Supports several options of tracking target files including full paths, root folders, and using extensions or strict filenames
* Supports target's machine (treminal or graphic) UI for messaging and files recovery
* Supports several options of tracking target files including full paths, root folders and using extensions or strict filenames
* Supports target's machine (terminal or graphic) UI for messaging and files recovery
* Payload compilation for more convenient portable option
* Easy graphic payload geneartor
* Custom victim message and ransom details

## Payload
The paylaod runs on the target's machine and responsible for several tasks:
The payload runs on the target's machine and responsible for several tasks:
* Establish connection with the server and register its data
* Locate target files on local machine's file system
* Encrypt the files and update the server about the process
Expand All @@ -22,7 +22,7 @@ The paylaod runs on the target's machine and responsible for several tasks:
Run ``plgenerator.py`` to load the payload generator window, where the payload's data is defined:
* Server's ip and port addresses
* Rasnom time in hours and json file containing the target files (see taregts files section)
* Payment data (optional- in case paymant is requiered) such as amount, payment details (such crypto address) and contact details.
* Payment data (optional- in case paymant is requiered) such as amount, payment details (such as crypto address) and contact details.
* User interface- console/terminal (text) or graphic (os window)
* Payload's filename (used for disguise) and ID number.
There are two options for generation: simple generation (.py file) or compilation (executable file) which is more portable.
Expand All @@ -41,7 +41,7 @@ Files per full path which could save expensive search time:
{
"files": {
"fullPath": [
"C:/Users/t/Desktop/python/ransome/test_files/file1.txt"
"C:\Users\User\Documents\file1.txt"
]
}
}
Expand All @@ -51,11 +51,11 @@ Files per root folder, which may include filenames or extensions:
{
"files": {
"fullPath": [
"C:/Users/User/Desktop/python/ransome/test_files/file1.txt"
"C:\Users\User\Documents\file1.txt"
],
"roots": [
{
"paths": ["C:/Users/user/Documents", "C:/Users/user/videos"],
"paths": ["C:/Users/User/Documents", "C:/Users/User/videos"],
"files": [
"accounts",
"trip"
Expand All @@ -74,7 +74,7 @@ Files per root folder, which may include filenames or extensions:
### Recovery
The files can be restored by inserting the cipher key and decrypting them throught the user inetrface once the attack is completed.
### Safety option
As the program was written for educaiotnal purpose soley it does not remove the encryption key from the victim's machine and provide a recovery option by revelaing the key by a click of button.
As the program was written for educaiotnal purpose soley it does not remove the encryption key from the victim's machine and provide a recovery option by revealing the key by a click of a button.
## Server
The server is used for payload registeriaiton, activation and storing their data and operation status. The payloads inform the server about the target files that were located and update their encryption status, send a copy of the generated cipher key and notify when an attacked is executed. The data can be extarcted any time and restored to the payloads when their activity is halted.

Expand Down

0 comments on commit bbce2e5

Please sign in to comment.