Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/NextronSystems/ransomware-simulator
Ransomware simulator written in Golang
https://github.com/NextronSystems/ransomware-simulator
Last synced: 24 days ago
JSON representation
Ransomware simulator written in Golang
- Host: GitHub
- URL: https://github.com/NextronSystems/ransomware-simulator
- Owner: NextronSystems
- License: mit
- Created: 2022-04-05T12:21:28.000Z (over 2 years ago)
- Default Branch: master
- Last Pushed: 2022-06-30T12:45:56.000Z (over 2 years ago)
- Last Synced: 2024-11-22T02:46:41.273Z (30 days ago)
- Language: Go
- Size: 202 KB
- Stars: 410
- Watchers: 12
- Forks: 51
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- StarryDivineSky - NextronSystems/ransomware-simulator
README
# QuickBuck - Ransomware Simulator
____ _ __ ___ __
/ __ \ __ __ (_)____ / /__ / _ ) __ __ ____ / /__
/ /_/ // // // // __// '_// _ |/ // // __// '_/
\___\_\\_,_//_/ \__//_/\_\/____/ \_,_/ \__//_/\_\
Nextron Systems GmbHThe goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware.
This tool simulates typical ransomware behaviour, such as:
- Staging from a Word document macro
- Deleting Volume Shadow Copies
- Encrypting documents (embedded and dropped by the simulator into a new folder)
- Dropping a ransomware note to the user's desktopThe ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.
Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.
## Usage
Ransomware Simulator
Usage:
ransomware-simulator [command]Examples:
ransomware-simulator runAvailable Commands:
help Help about any command
run Run ransomware simulatorFlags:
-h, --help help for ransomware-simulatorUse "ransomware-simulator [command] --help" for more information about a command.
Run command:
Run Ransomware Simulator
Usage:
ransomware-simulator run [flags]Flags:
--dir string Directory where files that will be encrypted should be staged (default "./encrypted-files")
--disable-file-encryption Don't simulate document encryption
--disable-macro-simulation Don't simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
--disable-note-drop Don't drop pseudo ransomware note
--disable-shadow-copy-deletion Don't simulate volume shadow copy deletion
-h, --help help for run
--note-location string Ransomware note location (default "C:\\Users\\neo\\Desktop\\ransomware-simulator-note.txt")## Screenshots
![Execution and Process Tree](/images/quickbuck_demo.png)