This project is a controlled and educational simulation of malware behavior using Python.
It explores how ransomware and keylogger techniques work — not to exploit systems, but to understand them and learn how to defend against them.
⚠️ Disclaimer: This project was developed for educational purposes only, in a safe and controlled environment. No real data or systems were harmed.
A simple demonstration of how file encryption can be used to deny access to data.
- Generates an encryption key
- Encrypts files inside a test folder
- Decrypts them using the same key
- Displays a (very dramatic) ransom message
A basic implementation showing how keystrokes can be captured locally.
- Records keystrokes into a
.txtfile - Demonstrates how user input can be monitored
- Raises awareness about privacy and security risks
Because knowing how attacks work is only half of the story.
This project also explores:
- Antivirus and threat detection
- Firewalls and network protection
- Sandboxing for safe execution
- Backup strategies against data loss
- User awareness and social engineering
- Least privilege principle
- System updates and patching
👉 Full details available in DEFENSE.md
The test_files/ folder contains fictional files used during the simulation.
Some of them may feel... oddly relatable:
- a chaotic life status
- a slightly unhinged diary entry
- a spellbook (because why not?)
Because even in cybersecurity… a little personality matters 😌
- Python
cryptographypynput
Working on this project helped me understand:
- How ransomware-like encryption impacts data
- How keystroke logging works conceptually
- Why controlled environments are essential
- How critical defense strategies are in cybersecurity
Security is not just about building systems —
it’s about understanding how they break.
This project was built with curiosity, a bit of chaos, and a very tired brain…
but also a genuine desire to learn.
And honestly? That might be the most important part.