{"id":23421584,"url":"https://github.com/evilbytecode/thunderkitty-ransomware","last_synced_at":"2025-04-12T14:06:29.041Z","repository":{"id":246520678,"uuid":"821370700","full_name":"EvilBytecode/ThunderKitty-Ransomware","owner":"EvilBytecode","description":"Ransomware written in go, encrypt - decrypt.","archived":false,"fork":false,"pushed_at":"2024-06-28T13:13:36.000Z","size":2044,"stargazers_count":18,"open_issues_count":0,"forks_count":2,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-26T08:37:33.095Z","etag":null,"topics":["fud","go","golang","pentesting","ransomware","red-team","virus"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/EvilBytecode.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-06-28T11:44:57.000Z","updated_at":"2025-03-18T17:59:23.000Z","dependencies_parsed_at":"2024-06-28T13:02:51.976Z","dependency_job_id":"29c899b1-3037-401d-b6a1-dc3f3494ecef","html_url":"https://github.com/EvilBytecode/ThunderKitty-Ransomware","commit_stats":null,"previous_names":["evilbytecode/thunderkitty-ransomware"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FThunderKitty-Ransomware","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FThunderKitty-Ransomware/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FThunderKitty-Ransomware/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/EvilBytecode%2FThunderKitty-Ransomware/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/EvilBytecode","download_url":"https://codeload.github.com/EvilBytecode/ThunderKitty-Ransomware/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248578864,"owners_count":21127713,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["fud","go","golang","pentesting","ransomware","red-team","virus"],"created_at":"2024-12-23T02:16:07.946Z","updated_at":"2025-04-12T14:06:28.992Z","avatar_url":"https://github.com/EvilBytecode.png","language":"Go","readme":"### ThunderKitty-Ransomware\n\nThe encryption process involves the following steps:\n\n1. **Generate a User ID**: A unique user ID is generated to identify the victim.\n2. **Generate an Encryption Key**: A 256-bit AES encryption key is generated randomly.\n3. **Encrypt Files**: All files in the specified target directory are recursively encrypted using AES-GCM (Galois/Counter Mode). Each file is encrypted with a unique nonce.\n4. **Send Notification**: A notification containing the user ID, encrypted directory, and encryption key is sent to a specified Discord webhook.\n5. **Create Ransom Note**: A ransom note is created on the victim's desktop, providing instructions on how to pay the ransom and recover the encrypted files.\n\n### Decryption\n\nThe decryption process involves the following steps:\n\n1. **Obtain Decryption Key**: The victim must obtain the decryption key by following the instructions in the ransom note.\n2. **Decrypt Files**: The victim uses the provided decryption script to decrypt the encrypted files using the obtained key.\n\n## Usage\n\n### Ransomware.go\n\nReplace the placeholders in the script with appropriate values:\n\n- `dischook`: Your Discord webhook URL.\n- `targetDir`: The directory to encrypt.\n- `xmraddr`: Your Monero address for receiving the ransom.\n- `cashamt`: The ransom amount.\n- `email`: Your contact email.\n\n![image](https://github.com/EvilBytecode/ThunderKitty-Ransomware/assets/151552809/5ea603f7-0fa4-4e60-a467-5d5a9f432ed1)\n![image](https://github.com/EvilBytecode/ThunderKitty-Ransomware/assets/151552809/5a64ae2c-2d07-4998-9876-a070050195bd)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fthunderkitty-ransomware","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fevilbytecode%2Fthunderkitty-ransomware","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fevilbytecode%2Fthunderkitty-ransomware/lists"}