{"id":22960332,"url":"https://github.com/stringmanolo/dangerous","last_synced_at":"2025-04-02T02:43:24.773Z","repository":{"id":95119402,"uuid":"310168708","full_name":"StringManolo/dangerous","owner":"StringManolo","description":"Dangerous Malware. Educational purpouse only.","archived":false,"fork":false,"pushed_at":"2020-11-18T12:46:25.000Z","size":66,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-02-07T17:45:02.832Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/StringManolo.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2020-11-05T02:23:11.000Z","updated_at":"2020-11-18T12:46:27.000Z","dependencies_parsed_at":"2023-05-26T19:15:40.082Z","dependency_job_id":null,"html_url":"https://github.com/StringManolo/dangerous","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/StringManolo%2Fdangerous","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/StringManolo%2Fdangerous/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/StringManolo%2Fdangerous/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/StringManolo%2Fdangerous/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/StringManolo","download_url":"https://codeload.github.com/StringManolo/dangerous/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":246746879,"owners_count":20827061,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-12-14T18:33:00.125Z","updated_at":"2025-04-02T02:43:24.757Z","avatar_url":"https://github.com/StringManolo.png","language":"Python","readme":"# dangerous\nDangerous Malware. Educational purpouse only.  \n\nDon't donwload to your PC if you don't know what are you doing.  \n  \nDon't execute on other computers, systems, etc.  \nJust don't be dumb.  \n  \nI take no responsability for bad usage.  \n  \n## RANSOMWARE (smr.py)\n### Examples:\n\nEncrypt files in current folder:  \n```\npython smr.py -v -a smr -e -k 1337 -p ./ -c\n```\n  \nDecrypt files in current folder:  \n```\npython smr.py -v -a smr -d -k 1337 -p ./ -c\n```\n  \n### Arguments:  \nUsage: python smr.py [-option1] [-option2] [...]  \n -a,  --adition  Add/Remove file extension to/from file.   \n -c,  --compression  Compress/Decompress the files to reduce end size.  \n -d,  --decrypt  Only decrypt. If a non encrypted file is in the path, will be encrypted.  \n -e,  --encrypt  Only encrypt. Uses weak Symmetric-key algorithm. Similar to Vernam or Affine encryption.  \n -h,  --help     Open this menu.  \n -i,  --interactive  Extra help to use the ransomware.  \n -k,  --key      Key/Password to encrypt files.  \n -p,  --path     Chose the path where the ransomware is goinf to run. All files in the path ans subpaths will be selected.  \n -v,  --verbose  Add more output to the console. Show more information about the running tasks.  \n\nNOTICE: You can lose your files if the ranswomare crash, your pc shutdown or you can't remember your encryption key. I didn't made a bruteforce algorithm to decrypt the files. Since password is reused can be possible to recover the encrypted files. If you seriously need to, send me a message. https://twitter.com/XSStringManolo  \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fstringmanolo%2Fdangerous","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fstringmanolo%2Fdangerous","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fstringmanolo%2Fdangerous/lists"}