Releases: Cursed271/CipherStrike
Releases · Cursed271/CipherStrike
CipherStrike v1.0
CipherStrike v1.0 – Ransomware Simulation & EDR Testing Tool
CipherStrike is a Python-based ransomware simulation tool designed to test Endpoint Detection and Response (EDR) systems. It mimics real-world ransomware attacks by encrypting files, exfiltrating data, generating ransom notes, and includes a command-and-control (C2) server for controlled testing.
Key Features
- 🛡️ Ransomware Simulation: Encrypts files and mimics real attack behavior.
- 💻 Command-and-Control (C2) Server: Facilitates communication with infected systems.
- 🔐 File Encryption: Secures victim data using AES encryption.
- 💾 Data Exfiltration: Sends encrypted data to a C2 server for testing detection.
- 📝 Ransom Note Generation: Simulates full attack scenarios for realistic testing.
Installation & Usage
- Ensure Python3 is installed.
- Clone the repo:
git clone https://github.com/Cursed271/CipherStrike
- Navigate to the directory:
cd CipherStrike
- Install dependencies:
pip3 install -r requirements.txt
- Run the PII Generator:
python3 CipherStrikePII.py
- Start the C2 Server:
python3 CipherStrikeC2.py
- Execute the Ransomware Script:
python3 CipherStrike.py
- Select the mode: Encryption, Decryption, or C2 Simulation when prompted.
Feedback & Contributions
Bug reports, feature requests, and contributions are welcome. Reach out via GitHub Issues, Twitter, or email at [email protected].
License
MIT License