Skip to content

πŸ” Custom Ransomware Simulation built for educational & cybersecurity training. Demonstrates safe AES-based file encryption/decryption in a sandbox environment. Includes key generation, logging, docs, and tests to help students understand ransomware behavior without real risks.

CodeWithTanim/Custom-Ransomware-Simulation

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

3 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Custom Ransomware Simulation πŸ”

Ransomware Simulation Banner

πŸ§‘β€πŸ’» Custom Ransomware Simulation ⚠️

Internship Project for Codec Technologies
A safe, educational simulation of ransomware encryption & decryption! πŸ”’
Demonstrates AES-based file encryption in a controlled sandbox environment.
Tech Stack: Python, pyAesCrypt, Logging


🧠 Introduction

Developed as part of my internship with Codec Technologies, the Custom Ransomware Simulation is a project designed to demonstrate ransomware-like behavior in a safe sandbox.
It showcases how ransomware encrypts and decrypts files, with proper logging and key handling, without putting real system files at risk.


πŸ“¦ Features

  • πŸ”‘ Key Generation – Secure random key creation saved in key.key
  • πŸ”’ File Encryption – Encrypts sandbox files with AES-256
  • πŸ”“ File Decryption – Decrypt files using the same key
  • πŸ—‚οΈ Sandbox Environment – Works only on test files (no risk to your system)
  • πŸ“œ Logging – Tracks every action in simulation.log
  • πŸ§ͺ Unit Tests – Includes test cases for safe verification

πŸ› οΈ Technologies Used

Python pyAesCrypt Logging Pytest


πŸš€ How to Run the Project?

βœ… Prerequisites:

  • Python 3.8+
  • Virtual environment recommended

πŸ› οΈ Setup:

# Clone and setup git clone https://github.com/CodeWithTanim/Custom-Ransomware-Simulation.git cd Custom-Ransomware-Simulation python -m venv venv venv\Scripts\activate # Windows source venv/bin/activate # Linux/macOS # Install requirements pip install -r requirements.txt # Run the app python src/main.py

πŸ—‚οΈ Project Structure

Custom-Ransomware-Simulation/ β”‚ β”œβ”€β”€ README.md ← Project documentation β”œβ”€β”€ requirements.txt ← Python dependencies β”‚ β”œβ”€β”€ docs/ ← Documentation & Screenshots β”‚ β”œβ”€β”€ project_overview.md β”‚ β”œβ”€β”€ encryption_demo.md β”‚ └── screenshots/ β”‚ β”œβ”€β”€ encrypt_demo.png β”‚ └── decrypt_demo.png β”‚ β”œβ”€β”€ src/ ← Source Code β”‚ β”œβ”€β”€ main.py ← Main program β”‚ β”œβ”€β”€ encryptor.py ← Encryption logic β”‚ β”œβ”€β”€ decryptor.py ← Decryption logic β”‚ └── utils.py ← Key generation & logging β”‚ β”œβ”€β”€ tests/ ← Unit Tests β”‚ β”œβ”€β”€ test_encryptor.py β”‚ β”œβ”€β”€ test_decryptor.py β”‚ └── test_utils.py β”‚ └── sandbox/ ← Safe testing folder β”œβ”€β”€ sample_text.txt └── sample_files/ └── sample1.txt 

🌟 Key Learnings (Internship)

  • Understood ransomware workflow (key, encrypt, decrypt)
  • Implemented AES-256 encryption in Python using pyAesCrypt
  • Practiced secure coding with logging and sandboxing
  • Gained hands-on with project structure & testing
  • Learned professional GitHub documentation

✍️ Developer

MD SAMIUR RAHMAN TANIM Intern at Codec Technologies πŸ”— GitHub | LinkedIn


πŸ“œ Acknowledgments

  • Thanks to Codec Technologies for the internship opportunity
  • Python & pyAesCrypt community for excellent documentation

🀝 Contribute

Pull requests are welcome! Found bugs or improvements? Fork the repo and submit a PR.


πŸ“‘ Connect With Me:

Facebook Instagram YouTube

About

πŸ” Custom Ransomware Simulation built for educational & cybersecurity training. Demonstrates safe AES-based file encryption/decryption in a sandbox environment. Includes key generation, logging, docs, and tests to help students understand ransomware behavior without real risks.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages