Alice is an experimental ransomware that uses advanced encryption techniques to protect files. It uses AES-256-CTR in Counter Mode with a random IV for each file, and performs encryption using multithreading for fast and efficient processing.
- [ - ] Run in Background (or not)
- [ + ] AES-256-CTR (Counter Mode) with random IV for each file
- [ - ] Multithreading for fast and efficient processing
- [ - ] RSA-4096 for secure client/server communication
- [ - ] Unlocker for decryption of files when needed
- [ - ] Optional TOR Proxy support for additional anonymity
- [ + ] Usage of AES CTR Cipher with stream encryption to avoid loading entire files into memory
- [ - ] Docker image for easy compilation and portability
- [ - ] Daemon or dropper modes for flexibility
Alice can be compiled using a Docker image, making it easy to build and run on different platforms. Additionally, it can run as a daemon or as a dropper, giving the user the ability to choose the best configuration for their needs.
While Alice utilizes advanced encryption techniques to protect files, it's important to note that no encryption technique is 100% secure. It's recommended to keep encryption keys secure and use additional security measures such as antivirus software and firewalls to protect the system.
Alice is licensed under the GNU General Public License, allowing it to be open source and free for anyone to use and modify.