Skip to content

CodeWithTanim/Custom-Ransomware-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Custom Ransomware Simulation 🔐

Ransomware Simulation Banner

🧑‍💻 Custom Ransomware Simulation ⚠️

Internship Project for Codec Technologies
A safe, educational simulation of ransomware encryption & decryption! 🔒
Demonstrates AES-based file encryption in a controlled sandbox environment.
Tech Stack: Python, pyAesCrypt, Logging


🧠 Introduction

Developed as part of my internship with Codec Technologies, the Custom Ransomware Simulation is a project designed to demonstrate ransomware-like behavior in a safe sandbox.
It showcases how ransomware encrypts and decrypts files, with proper logging and key handling, without putting real system files at risk.


📦 Features

  • 🔑 Key Generation – Secure random key creation saved in key.key
  • 🔒 File Encryption – Encrypts sandbox files with AES-256
  • 🔓 File Decryption – Decrypt files using the same key
  • 🗂️ Sandbox Environment – Works only on test files (no risk to your system)
  • 📜 Logging – Tracks every action in simulation.log
  • 🧪 Unit Tests – Includes test cases for safe verification

🛠️ Technologies Used

Python pyAesCrypt Logging Pytest


🚀 How to Run the Project?

✅ Prerequisites:

  • Python 3.8+
  • Virtual environment recommended

🛠️ Setup:

# Clone and setup
git clone https://github.com/CodeWithTanim/Custom-Ransomware-Simulation.git
cd Custom-Ransomware-Simulation
python -m venv venv
venv\Scripts\activate    # Windows
source venv/bin/activate # Linux/macOS

# Install requirements
pip install -r requirements.txt

# Run the app
python src/main.py

🗂️ Project Structure

Custom-Ransomware-Simulation/
│
├── README.md                  ← Project documentation
├── requirements.txt           ← Python dependencies
│
├── docs/                      ← Documentation & Screenshots
│   ├── project_overview.md
│   ├── encryption_demo.md
│   └── screenshots/
│       ├── encrypt_demo.png
│       └── decrypt_demo.png
│
├── src/                       ← Source Code
│   ├── main.py                ← Main program
│   ├── encryptor.py           ← Encryption logic
│   ├── decryptor.py           ← Decryption logic
│   └── utils.py               ← Key generation & logging
│
├── tests/                     ← Unit Tests
│   ├── test_encryptor.py
│   ├── test_decryptor.py
│   └── test_utils.py
│
└── sandbox/                   ← Safe testing folder
    ├── sample_text.txt
    └── sample_files/
        └── sample1.txt

🌟 Key Learnings (Internship)

  • Understood ransomware workflow (key, encrypt, decrypt)
  • Implemented AES-256 encryption in Python using pyAesCrypt
  • Practiced secure coding with logging and sandboxing
  • Gained hands-on with project structure & testing
  • Learned professional GitHub documentation

✍️ Developer

MD SAMIUR RAHMAN TANIM Intern at Codec Technologies 🔗 GitHub | LinkedIn


📜 Acknowledgments

  • Thanks to Codec Technologies for the internship opportunity
  • Python & pyAesCrypt community for excellent documentation

🤝 Contribute

Pull requests are welcome! Found bugs or improvements? Fork the repo and submit a PR.


📡 Connect With Me:

Facebook Instagram YouTube

About

🔐 Custom Ransomware Simulation built for educational & cybersecurity training. Demonstrates safe AES-based file encryption/decryption in a sandbox environment. Includes key generation, logging, docs, and tests to help students understand ransomware behavior without real risks.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages