Skip to content

Latest commit

 

History

History
90 lines (58 loc) · 2.42 KB

File metadata and controls

90 lines (58 loc) · 2.42 KB

🛡️ Malware Simulation Project

(because understanding attacks is the first step to defending them)

This project is a controlled and educational simulation of malware behavior using Python.
It explores how ransomware and keylogger techniques work — not to exploit systems, but to understand them and learn how to defend against them.

⚠️ Disclaimer: This project was developed for educational purposes only, in a safe and controlled environment. No real data or systems were harmed.


✨ What’s inside?

🔐 Ransomware Simulation

A simple demonstration of how file encryption can be used to deny access to data.

  • Generates an encryption key
  • Encrypts files inside a test folder
  • Decrypts them using the same key
  • Displays a (very dramatic) ransom message

⌨️ Keylogger Simulation

A basic implementation showing how keystrokes can be captured locally.

  • Records keystrokes into a .txt file
  • Demonstrates how user input can be monitored
  • Raises awareness about privacy and security risks

🛡️ Defense & Awareness

Because knowing how attacks work is only half of the story.

This project also explores:

  • Antivirus and threat detection
  • Firewalls and network protection
  • Sandboxing for safe execution
  • Backup strategies against data loss
  • User awareness and social engineering
  • Least privilege principle
  • System updates and patching

👉 Full details available in DEFENSE.md


🧪 A small touch of personality

The test_files/ folder contains fictional files used during the simulation.

Some of them may feel... oddly relatable:

  • a chaotic life status
  • a slightly unhinged diary entry
  • a spellbook (because why not?)

Because even in cybersecurity… a little personality matters 😌


💻 Technologies

  • Python
  • cryptography
  • pynput

🧠 What I learned

Working on this project helped me understand:

  • How ransomware-like encryption impacts data
  • How keystroke logging works conceptually
  • Why controlled environments are essential
  • How critical defense strategies are in cybersecurity

📌 Final thoughts

Security is not just about building systems —
it’s about understanding how they break.

This project was built with curiosity, a bit of chaos, and a very tired brain…
but also a genuine desire to learn.

And honestly? That might be the most important part.