Ransomware for Testing purpose
Project description
Overview
I've tried searching ransomwares for testing in macos but most of them turned out to be shady. This one is different. I created it on my own and it replicates basic ransomware behaviour. The user has full control over which directories
and which file-types
to target.
After significant thinking about interruption during runtime of the ransomware and assessing the irreversible damages, I have added a few failsafes which might come in handy. One of them being The files being encrypted multiple times due to starting and stopping of the ransomware
. In cases like these, the multiple encrypted files can also be recovered, which makes it significantly better than any other test ransomware I found online.
Note: As I mentioned earlier, this is made for
macOS
only as I have usedApplescript
and other macOS dependent features to make it replicate ransomware behaviour.
However, If you like it and want me to create one for your prefered operating system, create an issue here and I'd be happy to help. Do star the repo!
Table of Contents
Please Read all Disclaimer and Precautions before use.
Working
,_________________, Monitors ,____________,
| Kill Protection |-------->------>-------| Ransomware |
| Program |-------->------>-------| Program |
'-----------------' Restarts if killed '-----,------'
|
|
,---------------------------'
| - For All Targeted Directories
| - Encrypts Targeted File Types
|
,--------, ,---'----, ,--------,
| Dir1 | | Dir2 | .... | Dir n |
'---,----' '-,------' '---,----'
| | |
,-------', ,-----'--, ,-----'--,
| File 1 | | File 2 | ..... | File n |
'--------' '--------' '--------'
Instruction of Usage
-
Installation
pip install test-ransomware
-
Usage
$ rw --help Test Ransomware v0.1.0 author: Soumyo Deep Gupta (d33p0st, d33pster) description: Dummy Ransomware to test Prevention/Detection and similar techniques. Syntax: rw [OPTIONS] [OPTIONS] --start | -s : This option starts the Kill Protection program which then starts the Ransomware. --recover | -r : This option recovers the affected files. --directories | -d : This option helps select target directories. [This is a mandatory option] Example: rw --start --directories dir1 dir2 ... --types | -t : This option helps select the target file types [NOT mandatory. Accepts File Extensions] Example: rw --start -d dir1 dir2 -t txt docx --help | -h : shows this help text and exit. [Developer OPTIONS] (Use with precautions) --start-runtime | -sr : starts ransomware directly. --rec | -rec : recovers files directly.
-
Basic Examples
# to start ransomware will kill protection and target jpg and jpeg files rw --directories ~/dir1 ~/dir2/dir3 --types jpg jpeg --start
# to recover the files affected by the above code. rw --directories ~/dir1 ~/dir2/dir3 --types jpg jpeg --recover
Detailed Features
-
Base Ransomware
The
Ransomware
scans and isolates the targeted files and replaces them with encrypted contents rendering them useless.After that step, It keeps on checking the encrypted file hashes and if some file change is detected (could be the user being successful in decrypting some file or simply changed the encrypted file either accidently or due to ill motive), the
Ransomware
again encrypts the changed file. -
Kill Protection
The
Ransomware
automatically restarts and re-encrypts the files.Note: Each time the ransomware quits due to any reason, it restarts and re-encrypts all the files.
-
Recovery
No matter how many times a file is encrypted, The
Test Ransomware
will recover the original file. -
Multiple Terminal Output
Once you start the
Ransomware
, apart from the current terminal, other terminals will open to notify about files and statuses. -
Faster than most
The
Ransomware
is written in a python-rust mix leveraging rust's speed in time consuming tasks such as scanning for files and as such.Note: This provides an addition test vector for Detection Techniques.
Precautions
-
As I mentioned earlier, Repeated killing wont help preventing/Safe-Guarding from the
Ransomware
. As soon as theRansomware
re-encrypts the files, the file size increases and therefore repeated killing will only result in resource loss. -
The Developer options are merely for testing and is not recommended to use.
-
Double-check directories and files before using the
Ransomware
. If by any chance, recovery fails, I am not responsible for any kind of damage. -
It is recommended to use this software for educational pupose only. Any damages to property or data or resource in any form or usage in illegal activities will result in the user being liable.
Issues
Create any issues found during usage or suggestions or anything here.
Pull Requests
For any Modifications or changes or upgrades make sure you create a pull request here.
DISCLAIMER
THIS SOFTWARE IS PROVIDED FOR EDUCATIONAL AND RESEARCH PURPOSES ONLY. THE CREATOR DOES NOT CONDONE OR ENCOURAGE THE USE OF THIS SOFTWARE FOR ANY ILLEGAL OR MALICIOUS ACTIVITY.
BY USING THIS SOFTWARE, YOU ACKNOWLEDGE AND AGREE THAT:
-
THE CREATOR SHALL NOT BE HELD RESPONSIBLE OR LIABLE for any damage, loss, or disruption caused by the use of this software. This includes but is not limited to damage to data, hardware, software, or other systems, whether used in testing, production, or otherwise.
-
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, either express or implied, including but not limited to the warranties of merchantability, fitness for a particular purpose, and non-infringement. In no event shall the creator be liable for any claims, damages, or other liability, whether in an action of contract, tort, or otherwise, arising from, out of, or in connection with the software or the use or other dealings in the software.
-
USERS OF THIS SOFTWARE ARE FULLY RESPONSIBLE for ensuring that they have all necessary permissions to use the software, especially in cases where it interacts with files, systems, or environments that do not belong to them.
-
ANY USE OF THIS SOFTWARE IN VIOLATION OF LOCAL, STATE, NATIONAL, OR INTERNATIONAL LAW is strictly prohibited and is the sole responsibility of the user. The creator is not liable for any legal consequences that may arise from improper or unauthorized use of this software.
-
BY USING OR DISTRIBUTING THIS SOFTWARE, YOU AGREE TO RELEASE THE CREATOR from any and all liability, claims, or damages arising from the use or misuse of the software, including any unauthorized distribution, modification, or reverse engineering of the software.
IMPORTANT: DO NOT USE THIS SOFTWARE IN PRODUCTION ENVIRONMENTS OR ON SYSTEMS THAT YOU DO NOT OWN WITHOUT EXPLICIT PERMISSION. ANY MALICIOUS USE OF THIS SOFTWARE IS STRICTLY PROHIBITED.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file test_ransomware-0.1.tar.gz
.
File metadata
- Download URL: test_ransomware-0.1.tar.gz
- Upload date:
- Size: 15.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.12.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 75763e3cc8feecd1b57e6063fc06a569f839aa1692fb55b8c6289b55f6a75f4d |
|
MD5 | f8e95e05dfe13893b37d686fd0ae9a5f |
|
BLAKE2b-256 | fab41ae9ffcae539f0718284a10d5159bcd077aa28b999d5c45f3ff911562b06 |
File details
Details for the file test_ransomware-0.1-cp312-cp312-macosx_11_0_arm64.whl
.
File metadata
- Download URL: test_ransomware-0.1-cp312-cp312-macosx_11_0_arm64.whl
- Upload date:
- Size: 226.3 kB
- Tags: CPython 3.12, macOS 11.0+ ARM64
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.1.0 CPython/3.12.3
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | aab1cdb0bc254a7c557014e5ab62be1d6a1cd04291a8edfc4ac8a77fc08f4186 |
|
MD5 | adba48a8c6e62a6c7b31c7a4c92397b9 |
|
BLAKE2b-256 | bc34f8a14f2fcdce25ebedc4fe5fde575f324e2a14f04618f55b9e7f5a8b08f1 |