Skip to content

(๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—ฎ๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ) Open source Ransomware with advanced Features and with service. It is also compatible with offline-Victim and you can customize the Encryption of Files.

Notifications You must be signed in to change notification settings

Samdatastellar/Nopyfy-Ransomware

Folders and files

NameName
Last commit message
Last commit date

Latest commit

ย 

History

2 Commits
ย 
ย 

Repository files navigation

Nopyfy-Ransomware

(๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—ฎ๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ) Open source Ransomware with advanced Features and with service. It is also compatible with offline-Victim and you can customize the Encryption of Files.

]|I{โ€ข------ยป Nฯƒฯแƒงฯแƒง-Rฮฑษณส‚ฯƒษฑษฏฮฑษพาฝ ยซ------โ€ข}I|[

๏ฝ๏ฝŽ ๏ผก๏ฝ„๏ฝ–๏ฝ๏ฝŽ๏ฝƒ๏ฝ…๏ฝ„ ๏ผฒ๏ฝ๏ฝŽ๏ฝ“๏ฝ๏ฝ๏ฝ—๏ฝ๏ฝ’๏ฝ…

This is paid Tool and Buy it from here

๐ŸŽ€ Use Coupon ๐ŸŽ€ - 10FREE (10% Off)

Description

Nopyfy-Ransomware is Open source Ransomware. you can download it's source Code from above. it is similar to hidden-tear ransomware but nopyfy is ahighly-upgraded version of hidden tear. It has more feature than hidden tear and also very easy to use beacause all things which user can fill are in one place and also Nopyfy prevent from Victim data lost by encrypt and save in localy when user are offline during attack and have smtp, ftp, php, web-pannel, mysql, locally on file-manger, phpmail and etc. Nopyfy use symmetric AES algorithm to encrypt files.We also provide this as service. Nopyfy is very easy to use,see demonstration video for help and Try it....

Nopyfy-Ransomware Demo - Here

Pricing

  • Nopyfy-Ransomware + Setup Video(Complete guide) + Free Setup(if you want)

Total Price: 99$

๐ŸŽ€ Use Coupon ๐ŸŽ€ - 10FREE (10% Off)

Contact

Telegram


Telegram - @HackerTBack

Email - info.hackertback@gmail.com

Features that you will use

Ransomware size is only 22kb

  • AES algorithm to encrypt files

  • Send encryption key by - PHP,SMTP,Ftp

  • Save localy encrypted victim data with name user-id

  • Password will encrypt by your entered password

  • Get password with user-id if user offline during attack(Using Nopyfy-information-decrypter)

  • Save generated Victim data in Your databases

  • All informations are sent if there is an internet connection and the ransomware wait for it if there isn't.

  • You can see Victim data by Webpanel and Mail and Ftp and result.txt (automatic created file in file-manager) and also in MySql database

  • it can encrypt upto 68 file-type

  • It now encrypts a wider variety of file types and has a changing desktop wallpaper and also create READ_IT.txt file with information and User-id and save it in many location

  • Nopyfy decrypter give massege for file are decrypted or not

  • Nopyfy decrypter change dekstop bacgroung after successful decryption

  • By User-id, you will able to get Victim information(encryption key, ip, time, username and pc name, etc) byNopyfy-information-decrypter

Features Of Nopyfy for getting Victim data

  • PHP Webserver (Only Php version 5.6 are supported)

  • SMTP Mail

  • Ftp Server(Encrypted form)

  • Victim ID - Save localy(With encrypted password and Victim data)

Under PHP Webserver

  • Web-panel

  • MySql database

  • Php mail

  • localy save data(in your server)

Power Of encryption

You can set your own encryption key and make it trillion in one and generate 10 digit password that required for decryption and encryption of password will be done by your password that you enter(8 digit password are allowed only)

What Nopyfy do - Demo

First he generate password and encrypt file with symmetric AES algorithm method. List of files they encrypt -

".txt", ".jar", ".exe", ".dat", ".contact" , ".settings", ".doc", ".docx", ".xls", ".xlsx", ".ppt", ".pptx", ".odt", ".jpg", ".png", ".csv", ".py", ".sql", ".mdb", ".sln", ".php", ".asp", ".aspx", ".html", ".htm", ".xml", ".psd" , ".pdf" , ".dll" , ".c" , ".cs", ".mp3" , ".mp4", ".f3d" , ".dwg" , ".cpp" , ".zip" , ".rar" , ".mov" , ".rtf" , ".bmp" , ".mkv" , ".avi" , ".apk" , ".lnk" , ".iso", ".7-zip", ".ace", ".arj", ".bz2", ".cab", ".gzip", ".lzh", ".tar", ".uue", ".xz", ".z", ".001", ".mpeg", ".mp3", ".mpg", ".core", ".crproj" , ".pdb", ".ico" , ".pas" , ".db" , ".torrent"

during encryption Nopyfy create READ_IT.txt and write your massage and save it in many location for preventing data lost because in readme file it include encrypted victim data with name 'ID' . When the process of sending password to our server were start, first he send Victim data to PHP server and then he send smtp mail and then he create a file with name of pc and also add some generated word(this will prevent data rewrites on fpt server file) and then he save encrypted user detail and send it to ftp server.

How to use Nopyfy-Decrypter - Demo

How to use

After any vitim get successfull attack, goto task manager and end process of Nopyfy or restart pc

password(10 digit password) get by these method -

  • goto your Web pannel (ex of my pannel - http://nopyfy-rans.000webhostapp.com/) and type your username and password (demo username and password - nopyfy) and in password collom, copy it.

  • goto mail app and you will saw a mail that subject is as well as victim pc nam,open it and copy password

  • goto ftp account(See 'How to use.txt'file in Demo folder of Nopyfy) and you will see file that name as pc name and some random word in file, copy it and use 'Nopyfy-information-decrypter' to decrypt it

  • goto Server folder of file manager and find result.txt file, open it and copy password

  • If you are using Php mail then you will also receive mail (to or from), open it and copy password

  • goto MySql database and find victim , goto victim and copy password

  • If vitim are offline on time of attack, then in encrypted form data of vitim(password, time, username, etc) are also save in all READ_IT.txt file in end of file with name id. when victim contact you, tell him for sending his id to you and then you use Nopyfy-information-decrypter for getting victim data and password. Decrypt and copy it.

How to use Nopyfy-information-decrypter - Demo

First open Nopyfy-information-decrypter.exe application in Nopyfy-information-decrypter folder and then in input, paste the User-id(encrypted victim data) and in pass, write your 8 digit password. If input and pass are correct then you will see popup message and one .txt file open that contain Victim data otherwise you will get error popup message

Compatibility

  • Windows

Paid Tools List

Here You Can buy Paid Hacking tools in very low cost or in free.

GH-Hacking-Tool-Pack

Trojan Rat Builder(348), Ransomware Builder(17), Crypter(110), Miner(9), Worm(8), Botnet(49), Virus Builder(62), Binder(35), Exploit(42), Keylogger & Stealer(40), Proxy Tool(30), Spoofer(12),Fake program & Sample Virus(64), GSM Box(), CEH Pack(34) & Many Mores. Around 9,975 tools, that you can use for Hacking.

Click here for more information and his real price

Our Price

  • Full Pack Price: 99$

  • Fees: 0$

  • Total: 99$

Buy it from here

Hacking-tools-Pack

This is Basic Tools for beginners or hacker. This Pack included - Trojan Rat Builder(310), Ransomware Builder(17), Crypter(72), Miner(9), Worm(8), Botnet(25), Virus Builder(9), Binder(25), Exploit(7), Keylogger & Stealer(40), Proxy Tool(9), Spoofer(11),Fake program & Sample Virus(64),Other & Tools(16). Around 610 tools, that you can use for Hacking.

Click here for more information

Our Price

  • Pack Price: 30$

  • Fees: 0$

  • Total: 30$

Buy it from here

ZagreuS Ransomware Builder

Some features :

Small stub size,Loader accept encryption Like botnets, Rats,Bypass UAC,Delete Shadow copy),Encryption speed faster than ever,Uses a hybrid combination of encryption algorithms,(AES-256 and RSA 2048 ),used asymmetric encryption It uses the public key in to encrypt the symmetric key,Track the number of victims.



Click here for more information and his real price A or B

Our Price

  • Ransomware Price: 35$

  • Fees: 0$

  • Total: 35$

Buy it from here

JDSingh Hacker tool Kit

This tool kit include many of the tools that can be use to hacking. It has best tools with working condition and this tools start with only one click on .cmd files. it has manytypes of rat, crypter, binder, botnets and many mores. His All tool are included in Hacking-Tools-Pack and GH-Hacking-Tool-Kit , it's free with any pack.

Click here for more information and his real price

Our Price

  • Kit Price: โ‚น0

  • Fees: โ‚น0

  • Total: โ‚น0

**Included In Hacking-Tools-Pack & GH-Hacking-Tool-Kit **

Screenshots

After Attack

FTP Server file

Getting Data using Victim ID

Gmail SMTP

'result txt' file

Web-Panel

Contact

Telegram


Telegram - @HackerTBack

Email - info.hackertback@gmail.com

About

(๐—ฅ๐—ฎ๐—ป๐˜€๐—ผ๐—บ๐˜„๐—ฎ๐—ฟ๐—ฒ ๐—ฎ๐˜€ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ) Open source Ransomware with advanced Features and with service. It is also compatible with offline-Victim and you can customize the Encryption of Files.

Topics

Resources

Stars

Watchers

Forks