Kali Linux

Ransomware-Simulator : Ransomware Simulator Written In Golang

Ransomware-Simulator, the goal of this repository is to provide a simple, harmless way to check your AV’s protection on ransomware.

This tool simulates typical ransomware behaviour, such as:

  • Staging from a Word document macro
  • Deleting Volume Shadow Copies
  • Encrypting documents (embedded and dropped by the simulator into a new folder)
  • Dropping a ransomware note to the user’s desktop

The ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.

Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.

Usage

Ransomware Simulator
Usage:
ransomware-simulator [command]
Examples:
ransomware-simulator run
Available Commands:
help Help about any command
run Run ransomware simulator
Flags:
-h, –help help for ransomware-simulator
Use “ransomware-simulator [command] –help” for more information about a command.

Run command:

Run Ransomware Simulator
Usage:
ransomware-simulator run [flags]
Flags:
–dir string Directory where files that will be encrypted should be staged (default “./encrypted-files”)
–disable-file-encryption Don’t simulate document encryption
–disable-macro-simulation Don’t simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
–disable-note-drop Don’t drop pseudo ransomware note
–disable-shadow-copy-deletion Don’t simulate volume shadow copy deletion
-h, –help help for run
–note-location string Ransomware note location (default “C:\Users\neo\Desktop\ransomware-simulator-note.txt”)

Screenshots

R K

Recent Posts

How to Use the Linux find Command to Locate Files Like a Pro

Managing files efficiently is a core skill for anyone working in Linux, whether you're a…

5 hours ago

How to Check Open Ports in Linux Using netstat, ss, and lsof

Open ports act as communication endpoints between your Linux system and the outside world. Every…

5 hours ago

Best Endpoint Monitoring Tools for 2026

Introduction In today’s cyber threat landscape, protecting endpoints such as computers, smartphones, and tablets from…

2 days ago

Best 9 Incident Response Automation Tools

Introduction In today's fast-paced cybersecurity landscape, incident response is critical to protecting businesses from cyberattacks.…

2 days ago

How AI Puts Data Security at Risk

Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…

2 months ago

The Evolution of Cloud Technology: Where We Started and Where We’re Headed

Image credit:pexels.com If you think back to the early days of personal computing, you probably…

3 months ago