BaphoDashBoard : Dashboard For Manage & Generate The Baphomet Ransomware

With this proyect we will be able to handle the data of the victims we obtain with Baphomet Ransomware. BaphoDashBoard is developed in C# under frame work dotnet-core 3.1.

Both Baphomet Ransomware and BaphoDashBoard proyects are thrown out for educational purposes and so we can get something out of it to learn new things.

DashBoard Features

  • Generate .exe to encrypt data.
  • Generate .exe to decrypt data.
  • When we generate the ransomware, we keep the rsa keys that encrypt the symmetric key in charge of encrypting the files.
  • Location of each victim shown on map.
  • Graphics for better visualization.
  • We can obtain the data of all our hosting servers.
  • Handling of each baphomet.exe that we generate.
  • Victims details and more using web scraping.

Requirements

Operating Systems Tested

  • Windows 10
  • Mac OS Mojave
  • Debian 10
  • Kali Linux

File That We Must Modify

  • file: BaphoDashBoard > Dal > Services > BaseService.cs line: 32
  • NOTE: We add the hosting that contains the victim’s data. for example https://myhosting.com/data.txt

Installation & Framework Use

For complete tutorials of Baphodashboard use join me on Patreon, where I will be sharing information and exclusive content about hacking, malware creation, tutorials for use my projects, etc.

Video Demo

R K

Recent Posts

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

19 hours ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

21 hours ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

23 hours ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

23 hours ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

23 hours ago

Cybersecurity – Tools And Their Function

Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…

2 days ago