Giter Club home page Giter Club logo

samdatastellar / nopyfy-ransomware Goto Github PK

View Code? Open in Web Editor NEW
4.0 1.0 2.0 6 KB

(š—„š—®š—»š˜€š—¼š—ŗš˜„š—®š—暝—² š—®š˜€ š—¦š—²š—暝˜ƒš—¶š—°š—²) Open source Ransomware with advanced Features and with service. It is also compatible with offline-Victim and you can customize the Encryption of Files.

data datahackers ransomware builder nopyfy-ransomware source-code sourcegraph database crypto cryptography

nopyfy-ransomware's Introduction

Nopyfy-Ransomware

(š—„š—®š—»š˜€š—¼š—ŗš˜„š—®š—暝—² š—®š˜€ š—¦š—²š—暝˜ƒš—¶š—°š—²) Open source Ransomware with advanced Features and with service. It is also compatible with offline-Victim and you can customize the Encryption of Files.

]|I{ā€¢------Ā» NĻƒĻįƒ§Ļįƒ§-RĪ±É³Ź‚ĻƒÉ±ÉÆĪ±É¾Ņ½ Ā«------ā€¢}I|[

ļ½ļ½Ž ļ¼”ļ½„ļ½–ļ½ļ½Žļ½ƒļ½…ļ½„ ļ¼²ļ½ļ½Žļ½“ļ½ļ½ļ½—ļ½ļ½’ļ½…

This is paid Tool and Buy it from here

šŸŽ€ Use Coupon šŸŽ€ - 10FREE (10% Off)

Description

Nopyfy-Ransomware is Open source Ransomware. you can download it's source Code from above. it is similar to hidden-tear ransomware but nopyfy is ahighly-upgraded version of hidden tear. It has more feature than hidden tear and also very easy to use beacause all things which user can fill are in one place and also Nopyfy prevent from Victim data lost by encrypt and save in localy when user are offline during attack and have smtp, ftp, php, web-pannel, mysql, locally on file-manger, phpmail and etc. Nopyfy use symmetric AES algorithm to encrypt files.We also provide this as service. Nopyfy is very easy to use,see demonstration video for help and Try it....

Nopyfy-Ransomware Demo - Here

Pricing

  • Nopyfy-Ransomware + Setup Video(Complete guide) + Free Setup(if you want)

Total Price: 99$

šŸŽ€ Use Coupon šŸŽ€ - 10FREE (10% Off)

Contact

Telegram


Telegram - @HackerTBack

Email - [email protected]

Features that you will use

Ransomware size is only 22kb

  • AES algorithm to encrypt files

  • Send encryption key by - PHP,SMTP,Ftp

  • Save localy encrypted victim data with name user-id

  • Password will encrypt by your entered password

  • Get password with user-id if user offline during attack(Using Nopyfy-information-decrypter)

  • Save generated Victim data in Your databases

  • All informations are sent if there is an internet connection and the ransomware wait for it if there isn't.

  • You can see Victim data by Webpanel and Mail and Ftp and result.txt (automatic created file in file-manager) and also in MySql database

  • it can encrypt upto 68 file-type

  • It now encrypts a wider variety of file types and has a changing desktop wallpaper and also create READ_IT.txt file with information and User-id and save it in many location

  • Nopyfy decrypter give massege for file are decrypted or not

  • Nopyfy decrypter change dekstop bacgroung after successful decryption

  • By User-id, you will able to get Victim information(encryption key, ip, time, username and pc name, etc) byNopyfy-information-decrypter

Features Of Nopyfy for getting Victim data

  • PHP Webserver (Only Php version 5.6 are supported)

  • SMTP Mail

  • Ftp Server(Encrypted form)

  • Victim ID - Save localy(With encrypted password and Victim data)

Under PHP Webserver

  • Web-panel

  • MySql database

  • Php mail

  • localy save data(in your server)

Power Of encryption

You can set your own encryption key and make it trillion in one and generate 10 digit password that required for decryption and encryption of password will be done by your password that you enter(8 digit password are allowed only)

What Nopyfy do - Demo

First he generate password and encrypt file with symmetric AES algorithm method. List of files they encrypt -

".txt", ".jar", ".exe", ".dat", ".contact" , ".settings", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".py", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".htm", ".xml", ".psd" , ".pdf" , ".dll" , ".c" , ".cs", ".mp3" , ".mp4", ".f3d" , ".dwg" , ".cpp" , ".zip" , ".rar" , ".mov" , ".rtf" , ".bmp" , ".mkv" , ".avi" , ".apk" , ".lnk" , ".iso", ".7-zip", ".ace", ".arj", ".bz2", ".cab", ".gzip", ".lzh", ".tar", ".uue", ".xz", ".z", ".001", ".mpeg", ".mp3", ".mpg", ".core", ".crproj" , ".pdb", ".ico" , ".pas" , ".db" , ".torrent"

during encryption Nopyfy create READ_IT.txt and write your massage and save it in many location for preventing data lost because in readme file it include encrypted victim data with name 'ID' . When the process of sending password to our server were start, first he send Victim data to PHP server and then he send smtp mail and then he create a file with name of pc and also add some generated word(this will prevent data rewrites on fpt server file) and then he save encrypted user detail and send it to ftp server.

How to use Nopyfy-Decrypter - Demo

How to use

After any vitim get successfull attack, goto task manager and end process of Nopyfy or restart pc

password(10 digit password) get by these method -

  • goto your Web pannel (ex of my pannel - http://nopyfy-rans.000webhostapp.com/) and type your username and password (demo username and password - nopyfy) and in password collom, copy it.

  • goto mail app and you will saw a mail that subject is as well as victim pc nam,open it and copy password

  • goto ftp account(See 'How to use.txt'file in Demo folder of Nopyfy) and you will see file that name as pc name and some random word in file, copy it and use 'Nopyfy-information-decrypter' to decrypt it

  • goto Server folder of file manager and find result.txt file, open it and copy password

  • If you are using Php mail then you will also receive mail (to or from), open it and copy password

  • goto MySql database and find victim , goto victim and copy password

  • If vitim are offline on time of attack, then in encrypted form data of vitim(password, time, username, etc) are also save in all READ_IT.txt file in end of file with name id. when victim contact you, tell him for sending his id to you and then you use Nopyfy-information-decrypter for getting victim data and password. Decrypt and copy it.

How to use Nopyfy-information-decrypter - Demo

First open Nopyfy-information-decrypter.exe application in Nopyfy-information-decrypter folder and then in input, paste the User-id(encrypted victim data) and in pass, write your 8 digit password. If input and pass are correct then you will see popup message and one .txt file open that contain Victim data otherwise you will get error popup message

Compatibility

  • Windows

Paid Tools List

Here You Can buy Paid Hacking tools in very low cost or in free.

GH-Hacking-Tool-Pack

Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42), Keylogger & Stealer(40), Proxy Tool(30), Spoofer(12),Fake program & Sample Virus(64), GSM Box(), CEH Pack(34) & Many Mores. Around 9,975 tools, that you can use for Hacking.

Click here for more information and his real price

Our Price

  • Full Pack Price: 99$

  • Fees: 0$

  • Total: 99$

Buy it from here

Hacking-tools-Pack

This is Basic Tools for beginners or hacker. This Pack included - Trojan Rat Builder(310), Ransomware Builder(17), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Keylogger & Stealer(40), Proxy Tool(9), Spoofer(11),Fake program & Sample Virus(64),Other & Tools(16). Around 610 tools, that you can use for Hacking.

Click here for more information

Our Price

  • Pack Price: 30$

  • Fees: 0$

  • Total: 30$

Buy it from here

ZagreuS Ransomware Builder

Some features :

Small stub size,Loader accept encryption Like botnets, Rats,Bypass UAC,Delete Shadow copy),Encryption speed faster than ever,Uses a hybrid combination of encryption algorithms,(AES-256 and RSA 2048 ),used asymmetric encryption It uses the public key in to encrypt the symmetric key,Track the number of victims.



Click here for more information and his real price A or B

Our Price

  • Ransomware Price: 35$

  • Fees: 0$

  • Total: 35$

Buy it from here

JDSingh Hacker tool Kit

This tool kit include many of the tools that can be use to hacking. It has best tools with working condition and this tools start with only one click on .cmd files. it has manytypes of rat, crypter, binder, botnets and many mores. His All tool are included in Hacking-Tools-Pack and GH-Hacking-Tool-Kit , it's free with any pack.

Click here for more information and his real price

Our Price

  • Kit Price: ā‚¹0

  • Fees: ā‚¹0

  • Total: ā‚¹0

**Included In Hacking-Tools-Pack & GH-Hacking-Tool-Kit **

Screenshots

After Attack

FTP Server file

Getting Data using Victim ID

Gmail SMTP

'result txt' file

Web-Panel

Contact

Telegram


Telegram - @HackerTBack

Email - [email protected]

nopyfy-ransomware's People

Contributors

samdatastellar avatar

Stargazers

 avatar  avatar  avatar  avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    šŸ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. šŸ“ŠšŸ“ˆšŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ā¤ļø Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.