Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.


Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.


      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  

      pycryptor Ransomware

      1 post in this topic


      A short, sweet, PoC Python Ransomware (+A file vault for protecting the users files) using Advanced Encryption Standards. The program uses the AES-GCM-256 for its work.

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 2
      • Thanks 1

      Share this post

      Link to post
      Share on other sites

      Create an account or sign in to comment

      You need to be a member in order to leave a comment

      Create an account

      Sign up for a new account in our community. It's easy!

      Register a new account

      Sign in

      Already have an account? Sign in here.

      Sign In Now
      Sign in to follow this  

      • Similar Content

        • By dEEpEst
          "# mock-ransomware"
          Release\ransomware.exe Go to test folder, notice the permission changes, change them back to see the encrypted text Delete copied malware inside of \\Users\\<name>\\ransomwaredirectory open up regedit to also delete persistent keys reg DELETE HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ransomware_pwn /f The operation completed successfully. reg QUERY HKCU\Software\Microsoft\Windows\CurrentVersion\Run to verify To view the driver installed C:\> sc query MyCustomBeep SERVICE_NAME: MyCustomBeep TYPE : 1 KERNEL_DRIVER STATE : 1 STOPPED WIN32_EXIT_CODE : 1077 (0x435) SERVICE_EXIT_CODE : 0 (0x0) CHECKPOINT : 0x0 WAIT_HINT :  

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By M3tr4l14
          "De acuerdo a las cifras ofrecidas por KasperskyLab, el aumento de nuevas amenazas de ransomware se ha intensificado casi al doble."

          7,620 - 2018 - Amenazas de Ransomware
          16,017 - 2019 Amenazas de Ransomware
          Al igual, que los números de usuarios infectados (victimas) del ransomware.    
          158.921 usuarios afectados 2018
          230.000 usuarios afectados 2019
          Hidden Content
          Give reaction to this post to see the hidden content.
          13 tips para evitar la infeccion 
          Realizar periódicamente Backups de tu información. Se recomienda tener copias de nuestra informacion en medios como la nube, otro en físico, como memorias USB y discos duros portátiles. Mantener el Sistema Operativo actualizado hasta la ultima versión. Contar con software antivirus que tenga funciones anti-ransomware Aumentar la seguridad de tus dispositivos moviles como SmartPhones y Tablet. En 2017 Google elimino mas de 700,000 aplicaciones maliciosas de la PlayStore. De ser posible implementar extensiones anti-malware a los navegadores. Mantener actualizado los antivirus. Establecer filtros de seguridad en los e-mail, corporativos o no. No descargar archivos de ningún tipo de fuentes poco confiables o no oficiales. Contar con un repertorio de herramientas anti-ransomware. Esto debido a que existen herramientas especificas para un tipo de ransomware. Prepara un plan de respuesta y de ser necesario capacita a tus empleados o usuarios de la red, como a tu familia. Ejecuta análisis periódicos en busca de amenazas en tus equipos No pagar el rescate. En muchos casos, usuarios han pagado el rescate y no recuperaron ni su información ni sus equipos.  Usar el sentido común y no dar clic en todo lo que veamos. 
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          _ _ _ _ _ | | (_) | | | | | | | |__ _ __| | __| | ___ _ __ | |_ ___ __ _ _ __ | '_ \| |/ _` |/ _` |/ _ \ '_ \ | __/ _ \/ _` | '__| | | | | | (_| | (_| | __/ | | | | || __/ (_| | | |_| |_|_|\__,_|\__,_|\___|_| |_| \__\___|\__,_|_| It's a ransomware-like file crypter sample which can be modified for specific purposes.
          Uses AES algorithm to encrypt files. Sends encryption key to a server. Encrypted files can be decrypt in decrypter program with encryption key. Creates a text file in Desktop with given message. Small file size (12 KB) Doesn't detected to antivirus programs (15/08/2015)  Hidden Content
          Give reaction to this post to see the hidden content. Demonstration Video

          Hidden Content
          Give reaction to this post to see the hidden content. Download:

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst
          Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point
          * Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom.
          * An attacker who is very close with the victim’s WiFi or already hijacked computers with the USB access could propagate them to infect the cameras with deadly malware and ransomware.