NekRos is an Open-Source Ransomeware, with advanced Features, Which Looks Like Wannacry and Has C&C Server which can be Used to Retrive KEY
This Awesome Project will Just Blow Your Mind, The Most Scarest Ransomeware.
NekRos is a Ransomeware Generator for Windows, which is written in Python 3, NekRos means DEAD in Greek, now you can imagine that why I named it NekRos.
Project is made for good purpose, unethical use is prohibited, misuse of this project can lead you behind the Bar/Jail, Porject is made to give Practical and Deep Knowledge of Ransomeware and their side effects.
It is the responsibility of end user to use this Software ethically and for testing purpose only : )
:computer: This project was created only for good purposes and personal use.
THIS SOFTWARE IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. YOU MAY USE THIS SOFTWARE AT YOUR OWN RISK. THE USE IS COMPLETE RESPONSIBILITY OF THE END-USER. THE DEVELOPERS ASSUME NO LIABILITY AND ARE NOT RESPONSIBLE FOR ANY MISUSE OR DAMAGE CAUSED BY THIS PROGRAM.
Ransomware is a type of malware which encrypts the Data of Victim's PC making Data un-usable, they are mainly published to Encrypt victim's data which perpetually block the access to data unless a ransom is paid to Attacker/Hacker so that Decryption/Recovery of Data could be done.
If you are using this software then it means you agrees our T&C i.e Any misuse of this software, YOU - THE END USER is responsile and not the author.
Our aim of building this software is to give the Practical Knowledge of Ransomeware so that we can Build a Better Cyber Army Which can fight against the Cyber Crimes.
The primary (and original) goal of this project was to provide a proof-of-concept which demonstrated Python's capabilities as a language for real-world malware development as Traditionally C, C++ is used to Create Stuff like this.
Even thought not suggested, But You Can test it even on your main system, as by default it targets .lol and .mrrobot extensions file, for testing purpose make your own files with these entensions and then run main.py
MAIN.py is the Main File Which Do All Hard Work for You In Series main.py starts THREE stages i.e. stage1, stage2, stage3, and then atlast, starts the GUI Window which shows warning message.
GUI Window is capable to Call Reverse_Attack stager which takes KEY as argument.
GUI Window of Ransomeware is also capable to Show Encrypted Files Log In GUI Window.
+====================+
+ Ransomeware_Files +
+====================+
+
+===========+
+ Main.py +
+===========+
+ |____Run Stage1
+ |____Run Stage2
+ |____Run Stage3
+ |____Change Wallpaer After Given IntervL
+ |____Start GUI
+ |____Starts Timer
+ |____Can Initiate Decrypt Function [Takes KEY As Argument]
+ |____Can Show Encrypted Files Log
+
+===========+
+ Stage1.py +
+===========+
+ |____*****TAKES 4 Arguments, i.e. [server, username, password, db_name]*****
+ |____Generates Unique Machine ID
+ |____Generates Random Encryption Key With Fixed Length
+ |____Export KEY to Command & Control Server
+ |____*****RETURN : Encryption/Decryption KEY*****
+
+===========+
+ Stage2.py +
+===========+
+ |____*****TAKES NO ARGUMENTS*****
+ |____Searches for Target Extension Files on Different Thread
+ |____*****RETURN : List of TARGET Files*****
+
+===========+
+ Stage3.py +
+===========+
+ |____*****TAKES 2 ARGUMENTS, i.e. KEY & LIST of Sensitive Files*****
+ |____Initiate Encryption Process
+
+===================+
+ Reverse_Attack.py +
+===================+
+ |____*****TAKES 1 ARGUMENTS, i.e. KEY *****
+ |____Initiate Decryption Process
+
+=======================+
+ After_Stage1 (Folder) +
+=======================+
+ |
+ | +====================+
+ |____+ changeWallpaper.py +
+ | +====================+
+ |____Images [Wallpaper]
+
+=======================+
+ After_Stage2 (Folder) +
+=======================+
|
| +====================+
|____+ check_log_gui.py +
| +====================+
|
| +====================+
|____+ decryptor_gui.py +
| +====================+
|
| +========+
|____+ GUI.py +
| +========+
|
| +========================================+
|____+ img [Folder Containing Resource Image] +
+========================================+
Attack is Divided Into 3 Stages, Stages are Completed By Main Program (main.py)
+==========================+
+ Default Target Directory +
+==========================+
|____C:\Users\USERNAME\Pictures
|____C:\Users\USERNAME\Music
|____C:\Users\USERNAME\Downloads
|____C:\Users\USERNAME\Documents
|____C:\Users\USERNAME\Desktop
$ pip install requirements.txt
$ python main.py
#Run reverse_attack.py like this
$ python reverse_attack.py