Комментарии:
Nice Video 🫶
ОтветитьKey literally isn’t a real word anymore
Ответитьat the beginning you said you need a Linux system to do it, but then you did it on a Windows pc?
Ответитьah encrypting. dementia for computers
Ответитьhow to get back to script
script
Bro how to escape a ransom virus ?
ОтветитьChuck: let's create malware!
Also Chuck: downloads libraries
"It works"
But what if the user don't execute python as root ?
That's not about malware, but about files IO
When people usually going at work you re wasting your time behind comps hackers and playing stupid and hide and seeeek games 😂😂😂your software is not working I told you wasted time!😂
ОтветитьBut if you don't encrypt the file with the key stored, won't they be able to open it and access it. Do correct me here if I am wrong.
ОтветитьHe looks like a Viking
Work like a hacker
Talk like a 9 year old
how????❤❤❤
Thanks bro....
I will use it for legal reasons like helping people delete their files... for money
I had followed every command line by line but in the last my files donot decrypt , they still show binary codes , but actually those codes are different from what they show on encryption
ОтветитьYou can also convert it to an EXE.
ОтветитьThis was so much fun to follow along with 😂I love it
Ответитьi have test it out and edited the code add added a quine with neural network with q-learning and self learning and reinforce learning and with chatbot it was funny it was on my old pc
Ответитьransom ware is lame you should done a bot
Ответить"I'm from Texas by the way."
So you're a racist?
is there a linode alternative for free
ОтветитьI just want to know is it mandatory to do Btech CSE with Cyber security to become a Hacker and even you have done or not ? Please reply 🙏.....
Ответить69 k likes
ОтветитьI've always told people that you wouldn't believe how easy it is. Sure, it can be more complicated, but im not out to make malware. Just educate my friends and family of what to watch out for. I love videos like these because they show the scary truth.
ОтветитьDid linode became akamai for everyone ? Or am i alone ?
Ответитьcant wait to use this for educational purposes <3
ОтветитьDude your voice is awesome 😂
ОтветитьI could be mistaken but I don't think the key file would have been encrypted either way because it didn't exist in the context of that script before the files were added to your list because it didn't get added to the list it would not be encrypted
ОтветитьThats so cool
Ответитьthis is not a malware ... this is an application written in python which encrypts files ... to be a malware it would need to be persistent, cloaked/stealth, reverse connected to a control panel of any type, it should be encrypted also to not reverse engineer it, etc .. etc ... This is just a piece of code for students in development nothing incredible ...
ОтветитьThanks i will go and do my ”educatonal purposes” now!
ОтветитьThanks chuck. Now I want to learn Python. I'm a java developer.😅
ОтветитьHE INSTALLED MALWARE ON MY COMPUTER
Ответитьinstead of linode you can use virturalbox
Ответитьcan you also teach how to build a remote keylogger?
Ответитьfbi i just think its cool, im not doing anything with it.
ОтветитьWHAT ABOUT ROOTKIT
Ответитьpov ransomware locked up system files: 🥶🥶🥶🥶🥶🥶
ОтветитьPay attention company learn from this and not necessarily learn malware to the basis of information security
ОтветитьThank you man for the knowledge.... Time to learn 😈
Ответитьmy mum told me to f*ck off after i told her that
lmao
Can you show how to wrote spyware ?
ОтветитьI think we should put more effort into creating useful things with our computers. Creating malware, is like kids throwing eggs at passing cars. Which proves that many "computer guys" still play games and do kids stuff..
ОтветитьIf you are not comfortble using the cloud you can use a free hypervisor like VMware or Oracle just make sure you take a snapshot before you start this lab...
ОтветитьThanks my brother 8s going to flip
Ответить