Disclaimer: This code is intended solely for educational purposes. Any unauthorized use of this software for malicious intent is strictly prohibited and may violate local laws.
This repository contains a ransomware simulation project called Weber Ransomware, which demonstrates how ransomware operates, specifically focusing on file encryption and decryption. The main components include:
- ransome.py: The script responsible for encrypting files and generating a ransom note.
- decrpt.py: The script designed to decrypt the encrypted files using the generated key.
The objective of this project is to provide insight into the workings of ransomware for research and educational purposes. It is critical to understand the mechanics of such malware to develop effective defenses against it.
- File Encryption: Encrypts files with the
.weberextension using strong encryption algorithms. - Decryption Tool: Allows decryption of files using a secure key.
- Ransom Note Generation: Creates a ransom note detailing the payment process for decrypting files.
To use the scripts, ensure you have Python 3 installed along with the required libraries. Follow the steps below:
-
Clone the repository:
git clone https://github.com/yourusername/weber-ransomware.git cd weber-ransomware -
Install the required libraries:
pip install cryptography
- Place your target files in the same directory as
Encrypter.py. - Run the encryption script:
python Encrypter.py
- Ensure that the
key.keyfile is in the same directory asDecrypter.py. - Run the decryption script:
python Decrypter.py
This project is intended for educational use only. It is important to use this knowledge responsibly and ethically. Always obtain consent before testing security vulnerabilities on systems that are not your own.
- Cryptography Library: Utilized for implementing encryption and decryption functionalities.
- Educational Resources: Inspired by various cybersecurity research materials and resources.
This project is licensed under the Apache License 2.0.
For questions or collaboration opportunities, please reach out to:
Shalitha Madhuwantha
GitHub
LinkedIn
Personal Website
Warning: Engaging in any form of malicious cyber activity is illegal and unethical. This repository is for educational purposes only.
