Skip to content

๐Ÿ’€ Ransomware utility supporting multiple popular ciphers

Notifications You must be signed in to change notification settings

ReubenMathew/MERKware

ย 
ย 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 
ย 

Repository files navigation

MERKware

EECS3481 2020 Final Project

Don't get MERKed...

This project is only for education and research purposes. Use at your own risk. Maintainers and contributors to this project are not liable for any outcome when using or modifying this software.

Installation

Download latest executable (Windows only)

Get the latest release here

Requirements

  • Python 3.7+
  • Conda Environment
  • conda install pip
  • pip install -r requirements.txt

Build from source

  1. Install requirements
  2. Run python build.py
  3. Navigate to newly generated /dist to find MERK.exe

Usage

See USAGE.md for more detailed documentation

Command-line Flags

  • --folder -f The folder that will be encrypted
  • --type -t algorithm type selection
  • --secrets -s n-tuple input used for key secrets and other parameters
  • --action -a encrypt or decrypt

Algorithms

Available cryptographic algorithms for encryption and decryption.

Roadmap

  • RC4
  • XOR
  • AES
  • BLOWFISH (coming soon...)
  • RSA
  • ECC

Future Extensions

To load your own configuration

  • merk.config.json
  • auto mode. Where you run the executable and in encrypts your files in that directory.
  • Use the Virus Total API to automatically test AV bypass

To bypass AV:

  • Pass the execuable MERK into msfvenom -a x86_64 --platform linux -o MERK -k -e x86/shikata_ga_nai -c 3 < MERK

Group Members

About

๐Ÿ’€ Ransomware utility supporting multiple popular ciphers

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Python 100.0%