• Stars
    star
    115
  • Rank 297,798 (Top 6 %)
  • Language
    Python
  • License
    BSD 3-Clause "New...
  • Created over 4 years ago
  • Updated 5 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY

NekRos Logo

NekRos - Ransomeware

                    This Awesome Project will Just Blow Your Mind, The Most Scarest Ransomeware.

NekRos is a Ransomeware Generator for Windows, which is written in Python 3, NekRos means DEAD in Greek, now you can imagine that why I named it NekRos.

Project is made for good purpose, unethical use is prohibited, misuse of this project can lead you behind the Bar/Jail, Porject is made to give Practical and Deep Knowledge of Ransomeware and their side effects.

It is the responsibility of end user to use this Software ethically and for testing purpose only : )

NekRos - THE MOST Scariest Ransomeware

Disclaimer

πŸ’» This project was created only for good purposes and personal use.

THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.

What is Ransomeware ?

Ransomeware Scenario

Ransomware is a type of malware which encrypts the Data of Victim's PC making Data un-usable, they are mainly published to Encrypt victim's data which perpetually block the access to data unless a ransom is paid to Attacker/Hacker so that Decryption/Recovery of Data could be done.

Warning : PAY ATTENTION

Warning Image

If you are using this software then it means you agrees our T&C i.e Any misuse of this software, YOU - THE END USER is responsile and not the author.

Our aim of building this software is to give the Practical Knowledge of Ransomeware so that we can Build a Better Cyber Army Which can fight against the Cyber Crimes.

The primary (and original) goal of this project was to provide a proof-of-concept which demonstrated Python's capabilities as a language for real-world malware development as Traditionally C, C++ is used to Create Stuff like this.

Note : Project Under Development

TODO

  • Making GUI Ransomeware Generator
  • Implement Change language Function
  • Improve C&C Server/Website, put some checks that if payment == True, then only Retrive Key from Database.
  • Add New Features

By Default, Ransomeware Targets .lol, .mrrobot extension files

Even thought not suggested, But You Can test it even on your main system, as by default it targets .lol and .mrrobot extensions file, for testing purpose make your own files with these entensions and then run main.py

Features

  • Works on Windows.
  • Generates Unique Machine ID for Victim System's Identification.
  • Generates Purely Random Encryption/Decryption KEY (MD5 hash), thus no chance of Making Keygen of This Ransomeware.
  • Decryption/Recovery of Data is only Possible with Valid Key only.
  • Changes Wallpaper after Given Interval of Time (In seconds).
  • Server (Website) Integrated with Ransomeware which can be used to Retrive KEY.
  • Searches for Sensitive Files on Default target location.
  • Only Encrypt Target Specified Extension files (Customizable)
  • Export KEY to Server before Encryption Process takes place.
  • Stylish and Scariest GUI Which looks like WannaCry Ransomeware
  • Shows Encryped Files Log in GUI Window
  • Timer Integrated With GUI Window
  • Extremely Fast and easy to use
  • GUI DATABASE MANAGER which can be used by hackers to automate database interactions.
  • C&C Website/Server With Database, to Stored Decryption Key, Date, Payment [Boolean Type] & Unique ID
  • Function to Prohibit Encryption of Particular Directorys (Directory Exclusion)
  • Function to Change Language of GUI Window to Different Available langauges (Coming Soon)
  • Function to Disable Decryptor When Payment not made in Given Time (Coming Soon)
  • Creates Executable Binary With Zero Dependencies (Coming Soon)
  • Create less size ~ 5mb payload with advance functionality (Coming Soon)
  • Ofusticate the Payload before Generating it, hence Bypassing few more antivirus (Coming Soon)
  • Generated Payload is Encryted with base64, hence makes extremely difficult to reverse engineer the payload (Coming Soon)
  • Function to Kill Antivirus on Victim PC and tries to disable the security (Coming Soon)

Prerequisite

  • Python 3.X , Recommended 3.7
  • Few External Modules like pycryptodome, configparser, mysql-connector-python etc.

Tested On

Windows) Windows 8.1 - Pro

Order of Processes Which are taken

MAIN.py is the Main File Which Do All Hard Work for You In Series main.py starts THREE stages i.e. stage1, stage2, stage3, and then atlast, starts the GUI Window which shows warning message.

GUI Window is capable to Call Reverse_Attack stager which takes KEY as argument.

GUI Window of Ransomeware is also capable to Show Encrypted Files Log In GUI Window.

TREE to Show Role of Different Files

+====================+
+ Ransomeware_Files  +
+====================+
	+
	+===========+
	+  Main.py  +
	+===========+
	+	|____Run Stage1
	+	|____Run Stage2
	+	|____Run Stage3
	+	|____Change Wallpaer After Given IntervL
	+	|____Start GUI 
	+		|____Starts Timer
	+		|____Can Initiate Decrypt Function [Takes KEY As Argument]
	+		|____Can Show Encrypted Files Log
	+	
	+===========+
	+ Stage1.py +
	+===========+
	+	|____*****TAKES 4 Arguments, i.e. [server, username, password, db_name]*****
	+	|____Generates Unique Machine ID
	+	|____Generates Random Encryption Key With Fixed Length
	+	|____Export KEY to Command & Control Server
	+	|____*****RETURN : Encryption/Decryption KEY*****
	+
	+===========+
	+ Stage2.py +
	+===========+
	+	|____*****TAKES NO ARGUMENTS*****
	+	|____Searches for Target Extension Files on Different Thread
	+	|____*****RETURN : List of TARGET Files*****
	+
	+===========+
	+ Stage3.py +
	+===========+
	+	|____*****TAKES 2 ARGUMENTS, i.e. KEY & LIST of Sensitive Files*****
	+	|____Initiate Encryption Process
	+
	+===================+
	+ Reverse_Attack.py +
	+===================+
	+	|____*****TAKES 1 ARGUMENTS, i.e. KEY *****
	+	|____Initiate Decryption Process
	+	
	+=======================+
	+ After_Stage1 (Folder) +
	+=======================+
	+	|
	+	|    +====================+
	+	|____+ changeWallpaper.py +
	+	|    +====================+
	+	|____Images [Wallpaper] 
	+	
	+=======================+
	+ After_Stage2 (Folder) +
	+=======================+
		|
		|    +====================+
		|____+ check_log_gui.py +
		|    +====================+
		|
		|    +====================+
		|____+ decryptor_gui.py +
		|    +====================+
		|
		|    +========+
		|____+ GUI.py +
		|    +========+
		|
		|    +========================================+
		|____+ img [Folder Containing Resource Image] +
		     +========================================+	

Attack/Stage Breakdown

Attack is Divided Into 3 Stages, Stages are Completed By Main Program (main.py)

  • In Stage1, (Unique MachineID & KEY) are generated and were exported to Remote Server.
  • In Stage2, Locates Target Extension Files in Default Target Directory.
  • In Stage3, KEY & List of TargetFiles (obtained from Stage1 & Stage2) are then used to launch Encryption.
  • In Finale Stage, Main Program launches Ransomeware GUI demanding for Ransome.

Default Target Directory

+==========================+
+ Default Target Directory +
+==========================+
	|____C:\Users\USERNAME\Pictures
	|____C:\Users\USERNAME\Music
	|____C:\Users\USERNAME\Downloads
	|____C:\Users\USERNAME\Documents
	|____C:\Users\USERNAME\Desktop

ScreenShots

Main GUI Window of NekRos Ransomeware

Check Encryped Files Log ~ GUI Window

Decryptor ~ GUI Window

Database Manager ~ For Attacker

Website Asking for Machine ID

Website showing Result

Usage

  • Upload Website Folder's Content to your server and update get_decrypt_code.php with right creds. present in website/php/
  • Create Database and Import nekros.sql in it.
  • Update config.txt present in Ransomeware folder.
  • Update config.txt present in db_manager folder to Manage database using GUI Window.
  • Install python and then install required modules using this command :
$ pip install requirements.txt
  • Run main.py like this
$ python main.py

Decryption of Files

  • Key is Exported to Server/Website before encryption process starts
  • Simply Acquire that key from Database throught website by Typing the Machine ID in website page OR Directly look for key in database.
  • Paste that Key in GUI Window OR Direclty Run reverse_attack.py and paste the KEY in script
#Run reverse_attack.py like this
$ python reverse_attack.py

More Repositories

1

thorse

THorse is a RAT (Remote Administrator Trojan) Generator for Windows/Linux systems written in Python 3.
Python
547
star
2

Sinister

Sinister is Windows/Linux Keylogger Generator which sends key-logs via email with other juicy target info
Python
418
star
3

KratosKnife

KratosKnife is a Advanced BOTNET Written in python 3 for Windows OS. Comes With Lot of Advanced Features such as Persistence & VM Detection Methods, Built-in Binder, etc
Python
335
star
4

crypter

Crypter in Python 3 with advanced functionality, Bypass VM, Encrypt Source with AES & Base64 Encoding | Evil Code is executed by bruteforcing the decryption key, and then executing the decrypted evil code
Python
315
star
5

apkinfector

Advanced Android AV Evasion Tool Written In Python 3 that can Embed/Bind meterpreter APK to any Legitimate APK
Python
265
star
6

subdover

Subdover is a MultiThreaded Subdomain Takeover Vulnerability Scanner Written In Python3
Python
97
star
7

fakemailer

Fake Mailer is a PHP Email Spoofer which is capable of sending spoofed or tampered emails to the target. No Need to Sign up, Send Email Anonymously, Demo Site is available for test!
HTML
69
star
8

oscp-notes

OSCP Notes written from PWK Course
44
star
9

aapfinder

AAP Finder (Advanced Admin Page Finder) is a tool written in Python3 with advanced functionalities
Python
44
star
10

Log4jScanner

Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains.
Python
41
star
11

ORhunter

ORhunter is an Open Redirect Vulnerability Scanner which Passively Crawls URLs from 3 Sources & Then Filter Potential URLs based on Parameter Values, then finally hunt them for Unvalidated Open Redirect
Python
40
star
12

brute-md5

Advanced, Light Weight & Extremely Fast MD5 Cracker/Decoder/Decryptor written in Python 3
Python
26
star
13

creds_harvester

Password Recovery Toolkit For Windows Written in Python 3
Python
25
star
14

ragno

Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common Crawl
Python
24
star
15

Java-Cheat-Sheet

Java Cheat Sheet : Comprehensive Java Programming Guide With Mini Projects | Best for people, who are coming from other programming language or Just want a quick Refresh
21
star
16

netscan

NetScan is a Network Reconnaissance Tool for Windows/Linux/OSx etc Written in Python 3.
Python
21
star
17

SQLiWeb

Lab Website For Practicing Different Types of SQL Injection Vulnerabilities
PHP
19
star
18

CVE-2020-5902-Scanner

Automated F5 Big IP Remote Code Execution (CVE-2020-5902) Scanner Written In Python 3
Python
15
star
19

TerminalChat

TerminalChat is a console based instant messaging application made for hackers written in python3 & php. Gives all Basic Messaging Functionality
PHP
15
star
20

FileUploadWeb

Collection of Vulnerable Websites containing File Upload Vulnerability for practicing skill
HTML
13
star
21

PythonWindowsService

Basic Script which you can use to create a Windows service In Python
12
star
22

EARScanner

Execution After Redirect (EAR) / Long Response Redirection Vulnerability Scanner written in python3, It Fuzzes All URLs of target website & then scan them for EAR
Python
11
star
23

PushpenderIndia

My GitHub Profile-README
6
star
24

Free_YouTube_Stats_Badge

This project will help you to create Live img.shields.io Badges which will Count YouTube Stats (Subscriber, Views, Videos) without YouTube API
Go
5
star
25

intelliHire

WarSpeed Hackathon By Lightspeed organised at 13 May 2023
HTML
3
star
26

Crunchy

Script to Generate Custom WiFi Passwords as per Target for Highest Cracking Possiblity
Shell
2
star
27

StoryScape

StoryScape is a GenAI Interactive Story teller made for Intel GenAI hackathon IIT Delhi
Jupyter Notebook
1
star
28

EasyFlaskRecaptcha

FlaskRecaptcha is a python Module which makes Google Recaptcha Integration in flask application easy
Python
1
star