Linchakin

Ransomware-Simulator - Ransomware Simulator Written In Golang

 May 27, 2022     No comments   

The goal of this repository is to provide a simple, harmless way to check your AV's protection on ransomware.

This tool simulates typical ransomware behaviour, such as:

  • Staging from a Word document macro
  • Deleting Volume Shadow Copies
  • Encrypting documents (embedded and dropped by the simulator into a new folder)
  • Dropping a ransomware note to the user's desktop

The ransomware simulator takes no action that actually encrypts pre-existing files on the device, or deletes Volume Shadow Copies. However, any AV products looking for such behaviour should still hopefully trigger.

Each step, as listed above, can also be disabled via a command line flag. This allows you to check responses to later steps as well, even if an AV already detects earlier steps.

Usage

Run command:
Run Ransomware Simulator
Usage:
ransomware-simulator run [flags]


Flags:
--dir string Directory where files that will be encrypted should be staged (default "./encrypted-files")
--disable-file-encryption Don't simulate document encryption
--disable-macro-simulation Don't simulate start from a macro by building the following process chain: winword.exe -> cmd.exe -> ransomware-simulator.exe
--disable-note-drop Don't drop pseudo ransomware note
--disable-shadow-copy-deletion Don't simulate volume shadow copy deletion
-h, --help help for run
--note-location string Ransomware note location (default "C:\\Users\\neo\\Desktop\\ransomware-simulator-note.txt")


Adblock test (Why?)


You may be interested in:
>> Is a Chromebook worth replacing a Windows laptop?
>> Find out in detail the outstanding features of Google Pixel 4a
>> Top 7 best earbuds you should not miss

Related Posts:
>> Recognizing 12 Basic Body Shapes To Choose Better Clothes
>>Ranking the 10 most used smart technology devices
>> Top 5+ Best E-readers: Compact & Convenient Pen
  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble
  •  Digg
Email ThisBlogThis!Share to XShare to Facebook

Related Posts:

  • National Small Business Week: 10 Best Practices for Small Business CybersecurityA recent survey conducted by CNBC and Momentive found that 56% of small business owners are not concerned about being the victim of a cyberattack in t… Read More
  • How I Integrated Cucumber Framework into a Test Project for BDD Implementation Cucumber Framework performs well in BDD implementation. Many companies are using BDD to develop test projects in development teams. I'll tell y… Read More
  • These Cup Noodle sodas look great (but sound gross)ByJoseph Foley Graphic DesignSeafood fizzy drink anyone?!We love trying new flavours, but sometimes you find yourself asking, is this safe? Much like the Coke plus Mentos scare, there was a rumour going arou… Read More
  • We love the caveman chic of this Nintendo Switch modByAmelia Bamsey NewsIt's an accessary for the Neanderthal in us all.The wonderful world of gaming is ever evolving, with consoles featuring the very latest tech and materials to make them cutting-edge as possible. But … Read More
  • Easy Ways to Improve Network Safety in the Workplace The importance of network safety in the workplace is something that you need to focus on all the time. This is the best way to make sure that your r… Read More
Newer Post Older Post Home

0 Comments:

Post a Comment


Copyright © 2025 Linchakin | Powered by Blogger
Design by Hardeep Asrani | Blogger Theme by NewBloggerThemes.com | Distributed By Gooyaabi Templates