You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
> ⚠️Note⚠️: This is an early stage of the ransomware created for fun and learning purpose. This program is not created to harm or dispute others. A Lot of changes has been done in the private repository. I will be releasing with the advance syscalls techniques.
18
+
16
19
### Features of Encryfer-X
17
20
18
21
* Data Encryption using Parallelism . [For Stealthy and Fast W]
@@ -38,22 +41,27 @@ Future Plans:
38
41
39
42
> ⚠️Note⚠️: By Default I have Enabled all features. Including Recursive Volume Encryption. To test this Ransomware comment or modify the functions !.
40
43
41
-
Build the following code.
44
+
To Build the following code.
42
45
43
-
```
46
+
47
+
```rust
44
48
cargobuild--release
45
49
```
46
50
47
51
You can find the Binary file at: `./target/release/Encryfer-X.exe`
48
52
49
-
To see the demo video check my tweet: [Tweet](https://x.com/5mukx/status/1829094735988076900)
50
-
51
53
> ⚠️Note⚠️: You need the Following 2 THings: AES wit 32.len() + Encrypted Hex Value that contains AES256 with chacha !.
52
54
55
+
To see the demo video check my tweet: [Tweet](https://x.com/5mukx/status/1829094735988076900)
56
+
53
57
For Decryption: [Encryfer-X-Decryptor](../Encyfer-X-Decryptor/)<br>
54
58
To Generate Keys: [Random-Keys-Generator](../Random-Keys-Generator/)
55
59
56
60
For More Offensive codes. Visit [Rust For Malware Development](https://github.com/Whitecat18/Rust-for-Malware-Development)
57
61
62
+
To Download Bundle [Decryptor + Key Generator](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples/Encryfer)
63
+
64
+
To download this: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples/Encryfer/Encryfer-X)
65
+
58
66
For more Quality Resources Follow me on X: [@5mukx](https://x.com/5mukx)
Visit in Repository: [Visit](https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples)
11
+
12
+
Download This Malware Paygrounds as .zip: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development/tree/main/Malware-Samples)
Copy file name to clipboardExpand all lines: README.md
+16-20Lines changed: 16 additions & 20 deletions
Original file line number
Diff line number
Diff line change
@@ -13,11 +13,16 @@
13
13
14
14
---------------------
15
15
16
-
> Note: These are my own research and implementations, derived from the original authors' work. If you discover any errors in these codes, please [contact](https://x.com/5mukx) or contribute to this repository.
16
+
## Table of Contexts
17
+
18
+
-[Rust for Malware Development](#rust-for-malware-development)
|[ECC Encryption](./Encryption%20Methods/ecc_shellcode_exec/)| Encrypt and Decrypt Shellcodes/Payloads using ECC (Elliptic Curve Cryptography) |
80
85
|[SystemFunction032/033](./Encryption%20Methods/SystemFunction032_033/)| Encrypt and Decrypt shellcode using undocumented winapi function. |
81
86
87
+
-------------
82
88
89
+
Click Here to download the Repository: **[Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development)**
83
90
84
-
Click Here to download the Repository: [Download](https://download.5mukx.site/#/home?url=https://github.com/Whitecat18/Rust-for-Malware-Development)
85
-
86
-
## Manifest dependencies for [winapi](https://docs.rs/winapi/latest/winapi/) to test and execute
> Tips for Rust Beginners: Copy and save the dependencies in Cargo.toml File. Versions may be different. Just copy the features when testing.
92
+
## Walkthrough
97
93
98
94
* New to Rust ? : Please Follow the steps here **[Compile](./deps.md)**
99
95
* How to Compile this Repository Source Codes **[README](./deps.md)**
100
-
* How to clean all the PoC recursively **[Commands](./CLEAN.md)**
96
+
* How to clean all the PoC recursively **[Commands](./CLEAN.md).**
101
97
***Cross Compilation Using Docker [READMe](./docker.md).**
102
98
103
99
--------
@@ -108,11 +104,11 @@ ntapi = "0.4.1"
108
104
109
105
*[Rust for CyberSecurity and Red Teaming](https://infosecwriteups.com/rust-for-cyber-security-and-red-teaming-275595d3fdec)
110
106
111
-
*[DLL Injection using Rust](https://smukx.medium.com/dll-injection-using-rust-593b83734c90)
107
+
*[DLL Injection using Rust](./dll_injection/)
112
108
113
-
⚠️ These Resources are only for Education Purposes Only ⚠️
109
+
## Disclaimer
114
110
111
+
⚠️ These Resources are only for Education Purposes Only. ⚠️
115
112
116
-
## Please Note
113
+
If you need an exploit or proof-of-concept (PoC) removed, please contact me via email at **[email protected]** or through my Twitter handle [@5mukx](https://x.com/5mukx).
117
114
118
-
If you need an exploit or proof-of-concept (PoC) removed, please contact me via email at [[email protected] (mailto:[email protected])] or through my Twitter handle [@5mukx](https://x.com/5mukx)
0 commit comments