Kali Linux

Ransomware-Simulator : Ransomware Simulator Written In Golang

Ransomware-Simulator, the goal of this repository is to provide a simple, harmless way to check your AV’s protection on ransomware.

This tool simulates typical ransomware behaviour, such as:

  • Staging from a Word document macro
  • Deleting Volume Shadow Copies
  • Encrypting documents (embedded and dropped by the simulator into a new folder)
  • Dropping a ransomware note to the user’s desktop

The ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.

Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.

Usage

Ransomware Simulator
Usage:
ransomware-simulator [command]
Examples:
ransomware-simulator run
Available Commands:
help Help about any command
run Run ransomware simulator
Flags:
-h, –help help for ransomware-simulator
Use “ransomware-simulator [command] –help” for more information about a command.

Run command:

Run Ransomware Simulator
Usage:
ransomware-simulator run [flags]
Flags:
–dir string Directory where files that will be encrypted should be staged (default “./encrypted-files”)
–disable-file-encryption Don’t simulate document encryption
–disable-macro-simulation Don’t simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
–disable-note-drop Don’t drop pseudo ransomware note
–disable-shadow-copy-deletion Don’t simulate volume shadow copy deletion
-h, –help help for run
–note-location string Ransomware note location (default “C:\Users\neo\Desktop\ransomware-simulator-note.txt”)

Screenshots

R K

Recent Posts

AutoExif – Simplifying Image Metadata Editing With Bash

AutoExif is a powerful Bash script designed to streamline the process of editing image metadata…

1 day ago

SimpleImager V4.3 : A Step-by-Step Guide To Efficient System Imaging

SimpleImager V4.3, your go-to tool for streamlined system imaging and data acquisition. Designed to simplify…

1 day ago

MetaOSINT – Revolutionizing OSINT Investigations With Top Tools And Resources

MetaOSINT enables open source intelligence ("OSINT") practitioners to jumpstart their investigations by quickly identifying relevant,…

1 day ago

ThreatPinch Lookup – Enhancing Cybersecurity Investigations Through Automated Tooltips

ThreatPinch Lookup creates informational tooltips when hovering oven an item of interest on any website.…

1 day ago

Oh Shint! Navigating The Depths Of Cyber-Intelligence With Donvito

Myself and any other potential contributors to this website are NOT in any way affiliated…

1 day ago

M.E.A.T. – Pioneering Mobile Forensics With The Mobile Evidence Acquisition Toolkit

The Mobile Evidence Acquisition Toolkit designed by BlackStone Discovery. Developed to enhance digital forensics, this…

2 days ago