• Stars
    star
    401
  • Rank 107,625 (Top 3 %)
  • Language
    Go
  • License
    MIT License
  • Created over 2 years ago
  • Updated over 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Ransomware simulator written in Golang

QuickBuck - Ransomware Simulator

  ____         _       __    ___              __
 / __ \ __ __ (_)____ / /__ / _ ) __ __ ____ / /__
/ /_/ // // // // __//  '_// _  |/ // // __//  '_/
\___\_\\_,_//_/ \__//_/\_\/____/ \_,_/ \__//_/\_\ 

Nextron Systems GmbH

The goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware.

This tool simulates typical ransomware behaviour, such as:

  • Staging from a Word document macro
  • Deleting Volume Shadow Copies
  • Encrypting documents (embedded and dropped by the simulator into a new folder)
  • Dropping a ransomware note to the user's desktop

The ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.

Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.

Usage

Ransomware Simulator

Usage:
ransomware-simulator [command]

Examples:
ransomware-simulator run

Available Commands:
help        Help about any command
run         Run ransomware simulator

Flags:
-h, --help   help for ransomware-simulator

Use "ransomware-simulator [command] --help" for more information about a command.

Run command:

Run Ransomware Simulator

Usage:
ransomware-simulator run [flags]

Flags:
    --dir string                     Directory where files that will be encrypted should be staged (default "./encrypted-files")
    --disable-file-encryption        Don't simulate document encryption
    --disable-macro-simulation       Don't simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
    --disable-note-drop              Don't drop pseudo ransomware note
    --disable-shadow-copy-deletion   Don't simulate volume shadow copy deletion
-h, --help                           help for run
    --note-location string           Ransomware note location (default "C:\\Users\\neo\\Desktop\\ransomware-simulator-note.txt")

Screenshots

Execution and Process Tree

More Repositories

1

APTSimulator

A toolset to make a system look as if it was the victim of an APT attack
Batchfile
2,439
star
2

thor-lite

Fast IOC and YARA Scanner
72
star
3

evtx-baseline

A repository hosting example goodware evtx logs containing sample software installation and basic user interaction
PowerShell
66
star
4

valhallaAPI

Valhalla API Client
Python
62
star
5

gimphash

Imphash-like calculation on Golang binaries
C
48
star
6

nextron-helper-scripts

Public tools, scripts or code snippets that can help when working with our products
PowerShell
45
star
7

aurora-agent-lite

Repository to handle issues with our free EDR agent Aurora Lite
25
star
8

aurora-agent-manual

Aurora Agent User Manual
Python
24
star
9

thor_attck

THOR MITRE ATT&CK Framework Coverage
24
star
10

thunderstorm-collector

THOR Thunderstorm Collectors
Go
24
star
11

simplesyslog

Simple SYSLOG client in Go
Go
21
star
12

thor-manual

THOR APT Scanner User Manual
Python
14
star
13

TA-aurora

Splunk Technology-AddOn for Aurora Sigma-Based EDR Agent. It helps parse and configure the necessary inputs to neatly consume Aurora EDR Agent Alerts into Splunk.
13
star
14

go-elasticsearch

Simple ElasticSearch API for Golang
Go
13
star
15

velociraptor-artifacts-thor

Thor Artifacts for Velociraptor
12
star
16

go-handle

Iterate over Windows Handles
Go
12
star
17

thunderstormAPI

Python module to interact with THOR Thunderstorm service
Python
10
star
18

asgard-manual

ASGARD Management Center Manual
PowerShell
9
star
19

iocs

Indicators of compromise from to analysis and research by Nextron Threat Research team
Python
9
star
20

Cortex-Analyzers

Cortex Analyzers for Nextron Products
Python
8
star
21

detection-kb

Detection Knowledge Base
6
star
22

thor-util-manual

THOR Util Manual
Python
5
star
23

postfix2thunderstorm

Postfix 2 Thor Thunderstorm
Go
3
star
24

aurora-helpers

Helper scripts and configs to be used with Aurora Agent
3
star
25

analysis-cockpit-manual

ASGARD Analysis Cockpit Manual
Python
3
star
26

thor-plugin

Plugin interface for THOR APT Scanner
Go
3
star
27

broker-network-manual

ASGARD Broker Network Manual
Python
1
star
28

log-analysis-manual

Log Analysis with THOR
Python
1
star
29

asgard-playbooks

Python
1
star
30

rule-info-pages

Information Pages for Special Rules
1
star
31

thor-microsoft-defender-guide

THOR Integration Guide for Microsoft Defender ATP
Python
1
star
32

thor-thunderstorm-setup-guide

THOR Thunderstorm Setup Guide
Python
1
star
33

inventory-analyzer-manual

Python
1
star