Cryptonite

Cryptonite

The ransomware was developed for the Windows operating system. Before distributing it to the victims, it is simple to test it in a safe setting. Python was used to create this.

TASKLIST:

  1. Encrypt all files save those that are special to the system.
  2. Only a specific key can be used to decrypt encryption.
  3. Use a secure tunnel, preferably NGROK, to send the victim’s credentials to the attacker.
  4. After encryption, a pop-up box should appear asking for a ransom.
  5. Create a server to retrieve data transmitted by the victim
  6. Add custom extensions to encrypted files
  7. Create an executable file generator
  8. Graphical User Interface (GUI): (Victim side)

9.Graphical User Interface (GUI): (Attacker side)

Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purpose.

Download Link: https://github.com/CYBERDEVILZ/Cryptonite

Leave a Reply

Your email address will not be published.

Write for Us

    Get in Touch To get Free Demo

    We are available 24 * 7, Contact Us and Avail Exciting Discount Offers​