Skip to content

Ace-Krypton/Alice

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

48 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Alice

Alice is an experimental ransomware that uses advanced encryption techniques to protect files. It uses AES-256-CTR in Counter Mode with a random IV for each file, and performs encryption using multithreading for fast and efficient processing.

Features

  • [ - ] Run in Background (or not)
  • [ + ] AES-256-CTR (Counter Mode) with random IV for each file
  • [ - ] Multithreading for fast and efficient processing
  • [ - ] RSA-4096 for secure client/server communication
  • [ - ] Unlocker for decryption of files when needed
  • [ - ] Optional TOR Proxy support for additional anonymity
  • [ + ] Usage of AES CTR Cipher with stream encryption to avoid loading entire files into memory
  • [ - ] Docker image for easy compilation and portability
  • [ - ] Daemon or dropper modes for flexibility

Compatibility and Configuration Options

Alice can be compiled using a Docker image, making it easy to build and run on different platforms. Additionally, it can run as a daemon or as a dropper, giving the user the ability to choose the best configuration for their needs.

Security Considerations

While Alice utilizes advanced encryption techniques to protect files, it's important to note that no encryption technique is 100% secure. It's recommended to keep encryption keys secure and use additional security measures such as antivirus software and firewalls to protect the system.

Licensing

Alice is licensed under the GNU General Public License, allowing it to be open source and free for anyone to use and modify.