Skip to content

xtheredviper/malware-simulation-python

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛡️ Malware Simulation Project

(because understanding attacks is the first step to defending them)

This project is a controlled and educational simulation of malware behavior using Python.
It explores how ransomware and keylogger techniques work — not to exploit systems, but to understand them and learn how to defend against them.

⚠️ Disclaimer: This project was developed for educational purposes only, in a safe and controlled environment. No real data or systems were harmed.


✨ What’s inside?

🔐 Ransomware Simulation

A simple demonstration of how file encryption can be used to deny access to data.

  • Generates an encryption key
  • Encrypts files inside a test folder
  • Decrypts them using the same key
  • Displays a (very dramatic) ransom message

⌨️ Keylogger Simulation

A basic implementation showing how keystrokes can be captured locally.

  • Records keystrokes into a .txt file
  • Demonstrates how user input can be monitored
  • Raises awareness about privacy and security risks

🛡️ Defense & Awareness

Because knowing how attacks work is only half of the story.

This project also explores:

  • Antivirus and threat detection
  • Firewalls and network protection
  • Sandboxing for safe execution
  • Backup strategies against data loss
  • User awareness and social engineering
  • Least privilege principle
  • System updates and patching

👉 Full details available in DEFENSE.md


🧪 A small touch of personality

The test_files/ folder contains fictional files used during the simulation.

Some of them may feel... oddly relatable:

  • a chaotic life status
  • a slightly unhinged diary entry
  • a spellbook (because why not?)

Because even in cybersecurity… a little personality matters 😌


💻 Technologies

  • Python
  • cryptography
  • pynput

🧠 What I learned

Working on this project helped me understand:

  • How ransomware-like encryption impacts data
  • How keystroke logging works conceptually
  • Why controlled environments are essential
  • How critical defense strategies are in cybersecurity

📌 Final thoughts

Security is not just about building systems —
it’s about understanding how they break.

This project was built with curiosity, a bit of chaos, and a very tired brain…
but also a genuine desire to learn.

And honestly? That might be the most important part.

About

A controlled educational laboratory for simulating Ransomware and Keylogger behaviors using Python. Focused on understanding malware mechanics, detection, and mitigation strategies.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages