Skip to content

Python ransomware simulator for EDR testing. Encrypts, exfiltrates, and communicates via C2 — built for red‑team cyber defense validation.

License

Notifications You must be signed in to change notification settings

Cursed271/CipherStrike

Repository files navigation

Welcome to CipherStrike Typing SVG


Version License Python Status


Overview 🎯

CipherStrike is a Python-based ransomware simulation tool designed to test endpoint detection and response (EDR) systems. It mimics a real-world ransomware attack, encrypting files, exfiltrating data, and providing decryption functionality. A command-and-control (C2) server is included for victim communication, enabling testing and strengthening of cybersecurity defenses.

Key Features

  • 🛡️ Simulates Ransomware Attacks: Encrypts files and mimics real-world ransomware behavior.
  • 💻 Command-and-Control (C2) Server: Allows communication between attacker and infected systems.
  • 🔐 File Encryption: Uses AES encryption to secure victim data.
  • 💾 Data Exfiltration: Sends encrypted data to a C2 server for testing exfiltration detection.
  • 📝 Ransom Note: Generates a ransom note for victim systems to simulate a full attack scenario.

Screenshots 📸

CipherStrike Interface:

CipherStrike C2 Interface:

CipherStrike Dummy PII Data Generator:

Installation ⚒️

  1. Pre-requisites: Ensure you have Python3 installed, and install dnsx and subfinder using your package manager (apt or brew).
  2. Clone the Repo: Use "git clone https://github.com/Cursed271/CipherStrike"
  3. Traverse into the Directory: Use "cd CipherStrike"
  4. Install Dependencies: Use "pip install -r requirements.txt"
  5. Execute the PII Generator Script: Use "python3 CipherStrikePII.py"
  6. Execute the C2 Server Script: Use "python3 CipherStrikeC2.py"
  7. Execute the Ransomware Script: Use "python3 CipherStrike.py"
  8. Choose the Ransomware Mode: Encryption, Decryption or C2 Simulation

Legal Disclaimer ⚖️

⚠️ Important Notice

This tool is intended for:

  • Authorized security testing ONLY
  • Educational and research purposes
  • Legal and ethical use cases

You must:

  • Obtain proper authorization before use
  • Comply with all applicable laws
  • Use responsibly and ethically

The author assumes no liability for misuse of this tool.

Contributing 💡

  • Steven Pereira (aka Cursed) - Creator & Maintainer

Contributions welcome! Feel free to:

  • 🐛 Report bugs
  • 💡 Suggest features
  • 🔧 Submit pull requests
  • 📖 Improve documentation

License 📃

CipherStrike is licensed under the COE or CursedSec Ownership Edict License.

This software is proprietary intellectual property owned exclusively by CursedSec.

Unauthorized redistribution, modification, and re-uploading to any other repository (public or private) are strictly forbidden and constitute a direct violation of the CursedSec Ownership Edict (COE).

Consider this a warning: I track every copy. Get your own ideas, you lazy little shits.

Violators will face immediate legal action and DMCA takedown requests. All development must be conducted via approved Pull Requests on this official repository.

Let's Connect ⛓️‍💥

Have suggestions or feature requests? Feel free to reach out via:

Your feedback helps improve CipherStrike! Contributions and PRs are always welcome. 🚀