Wednesday, May 22, 2024


The ransomware was developed for the Windows operating system. Before distributing it to the victims, it is simple to test it in a safe setting. Python was used to create this.


  1. Encrypt all files save those that are special to the system.
  2. Only a specific key can be used to decrypt encryption.
  3. Use a secure tunnel, preferably NGROK, to send the victim’s credentials to the attacker.
  4. After encryption, a pop-up box should appear asking for a ransom.
  5. Create a server to retrieve data transmitted by the victim
  6. Add custom extensions to encrypted files
  7. Create an executable file generator
  8. Graphical User Interface (GUI): (Victim side)

9.Graphical User Interface (GUI): (Attacker side)

Disclaimer: The intended use for the tool is strictly educational and should not be used for any other purpose.

Download Link:



Please enter your comment!
Please enter your name here

Most Popular

Recent Comments

Izzi Казино онлайн казино казино x мобильді нұсқасы on Instagram and Facebook Video Download Made Easy with
Temporada 2022-2023 on CamPhish
2017 Grammy Outfits on Meesho Supplier Panel: Register Now!
React JS Training in Bangalore on Best Online Learning Platforms in India
DigiSec Technologies | Digital Marketing agency in Melbourne on Buy your favourite Mobile on EMI
亚洲A∨精品无码一区二区观看 on Restaurant Scheduling 101 For Better Business Performance

Write For Us