Skip to content

Latest commit

 

History

History
59 lines (30 loc) · 781 Bytes

File metadata and controls

59 lines (30 loc) · 781 Bytes

This software is intended for educational purposes only. It should never be used on real systems or for any malicious activities. Using ransomware on real systems without permission is illegal and unethical.

C2

Presistance

Data Exfiltration

File Encryption

            AES
            
            RSA
            
            ChaCha20
            
            ECC

            Hybrid

Data Destruction

Disable FAC

Multithreading

UAC Configurator

Memory Settings

Bypasser

Protect Process

Immortal Process

Kill Process

Inter-Process Communication (IPC)

Named Pipes

Network Communication

Shared Files

Anti VM

Anti Sandbox

Obfuscation

Background Image Changer

Text File Generation

Code Randomization

Timer with actions