Saturday, May 28, 2022
HomeHackerSimulator - Ransomware Simulator Written In Golang

Simulator – Ransomware Simulator Written In Golang




The purpose of this repository is to supply a easy, innocent strategy to verify your AV’s safety on ransomware.

This software simulates typical ransomware behaviour, akin to:

  • Staging from a Phrase doc macro
  • Deleting Quantity Shadow Copies
  • Encrypting paperwork (embedded and dropped by the simulator into a brand new folder)
  • Dropping a ransomware notice to the consumer’s desktop

The ransomware simulator takes no motion that truly encrypts pre-existing information on the gadget, or deletes Quantity Shadow Copies. Nonetheless, any AV merchandise on the lookout for such behaviour ought to nonetheless hopefully set off.

Every step, as listed above, may also be disabled by way of a command line flag. This lets you verify responses to later steps as nicely, even when an AV already detects earlier steps.

Utilization

Run command:

Run Ransomware Simulator

Utilization:
ransomware-simulator run [flags]

Flags:
--dir string
Listing the place information that can be encrypted must be staged (default "./encrypted-files")
--disable-file-encryption Do not simulate doc encryption
--disable-macro-simulation Do not simulate begin from a macro by constructing the next course of chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
--disable-note-drop Do not drop pseudo ransomware notice
--disable-shadow-copy-deletion Do not simulate quantity shadow copy deletion
-h, --help assist for run
--note-location string Ransomware notice location (default "C:CustomersneoDesktopransomware-simulator-note.txt")



RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments