You are currently viewing Cryptonite

The ransomware was developed for the Windows operating system. Before distributing it to the victims, it is simple to test it in a safe setting. Python was used to create this.


  1. Encrypt all files save those that are special to the system.
  2. Only a specific key can be used to decrypt encryption.
  3. Use a secure tunnel, preferably NGROK, to send the victim’s credentials to the attacker.
  4. After encryption, a pop-up box should appear asking for a ransom.
  5. Create a server to retrieve data transmitted by the victim
  6. Add custom extensions to encrypted files
  7. Create an executable file generator
  8. Graphical User Interface (GUI): (Victim side)

9.Graphical User Interface (GUI): (Attacker side)

Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purpose.

Download Link:

Leave a Reply