This repository contains two Python scripts for simulating ransomware encryption and decryption processes for educational purposes. The ransom.py
script encrypts files in its directory, while ransomdecrypter.py
decrypts them. This simulation is designed to provide practical insights into how ransomware operates and to enhance understanding of file encryption and decryption.
Disclaimer: This code is strictly for educational purposes. Creating, distributing, or using ransomware for malicious purposes is illegal and unethical.
- Python 3
cryptography
Python library
To install the required library, run: pip install cryptography
ransom.py
- Encrypts files in its directory.ransomdecrypter.py
- Decrypts files encrypted byransom.py
.generatedkey.key
- Stores the encryption key (created byransom.py
).
- Place the
ransom.py
script in a directory with files you wish to encrypt. - Run the script:
python3 ransom.py
- Encrypted files and the
generatedkey.key
will be generated in the same directory.
- Ensure
ransomdecrypter.py
andgeneratedkey.key
are in the same directory as the encrypted files. - Run the script:
python3 ransomdecrypter.py
- Files will be decrypted and restored to their original state.
- Use this script only in a controlled, secure environment and never on personal, sensitive, or critical files.
- The author is not responsible for any misuse of this educational tool or any damage incurred.
Enhance your knowledge in ethical hacking and cybersecurity with these Udemy courses:
- Etik Hacker Olma Kursu - Learn the latest tools and software in ethical hacking with practical examples.
- Etik Hacker Olma Kursu - Seviye 2 : Ağ İçi Saldırılar - Discover how ethical hackers execute network attacks and write their own attacks using the latest techniques.
- Python : Sıfırdan İleri Seviyeye - Etik Hacker Örnekleriyle - Master Python from beginner to advanced level with ethical hacking examples.
- Etik Hacker Olmak: Web Sızma Testleri ve Bug Bounty - Learn Web Penetration Testing & Bug Bounty operations with hundreds of different examples using the latest technology tools.
- Etik Hacker İleri Seviye: Sızma Testleri & Yetki Yükseltme - Advance your journey as a Cybersecurity Expert with Penetration Testing and Privilege Escalation Techniques.