Skip to content

guardicode/ransomware-payload

Repository files navigation

Ransomware Payload - Agent Plugin for Infection Monkey

Introduction

Ransomware Payload is an Agent Plugin for Infection Monkey that can simulate a ransomware attack by encrypting files on the target machine. It uses a simple bit-flipping algorithm to encrypt files, and the encryption is reversible by simply running the plugin again.

For more information, see the Ransomware Payload Plugin documentation.

For our Ransomware tutorial see Ransomware Tutorial.

Development

Setting up the development environment

To create the resulting Ransomware archive, follow these steps:

  1. Clone the Repository

    $ git clone https://github.com/guardicode/ransomware-payload.git
    $ cd ransomware-payload
  2. Install development dependencies

    This project uses Poetry for managing dependencies and virtual environments, and pre-commit for managing pre-commit hooks.

    $ pip install pre-commit poetry
    $ pre-commit install -t pre-commit
    $ poetry install

Running the test suite

The test suite can be run with the following command:

poetry run pytest

Building the plugin

To build the plugin, run the Agent Plugin Builder.

poetry run build_agent_plugin .

The build tool will create Ransomware-payload.tar, which can be installed in the Monkey Island.

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages