Hello everyone, This is the 3rd and the final part of Ransomware Development series in python. In this part, I have shown how we can send the Encryption/Decryption Key to attacked rather than storing it on the victim’s PC locally. …
Hello everyone, this is the second video of the ransomware development Series. In this video, I have explained how we can Recursively list files in the given path and then Encrypt/Decrypt them.
Hello everyone, this is the first video of the ransomware development Series. In this video, I have explained the basics of cryptography and how to encrypt and decrypt files using fernet module in python.
Hey guys! The following video shows you how to configure Kali Linux to route traffic through the TOR network to improve your privacy and anonymity.