• Generate a ransomware payload
  • With or without GUI payload
  • FUD (Fully Undetectable by Anti-Virus)
  • Works on Windows, MacOS and Linux
  • Super fast encryption with PyCrypto
  • Compile to EXE, APP or Unix/Linux executable
  • Custom icon for your EXE payload
  • Receive keys of victims
  • Decrypt files
  • Demo mode (payload won’t encrypt anything)
  • Fullscreen mode (Warning takes over the screen)
  • Custom warning message for your victim
  • Custom image in your payload
  • Ghost mode (Rename by adding .DEMON extention instead of encrypting the files)
  • Multiple encryption methods
  • Select file extentions to target
  • Decide if payload should self-destruct (Console mode feature only)
  • Decide wich drive to target for encryption (working directory)
  • Verified server access through port forwarding VPN
  • Encode payload as Morse code

By Treadstone 71

@Treadstone71LLC Cognitive Warfare Training, Intelligence and Counterintelligence Tradecraft, Influence Operations, Cyber Operations, OSINT,OPSEC, Darknet, Deepweb, Clandestine Cyber HUMINT, customized training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, Disinformation detection, Analysis as a Service